Home

Alcatel OmniStack OS-6200 User Guide

image

Contents

1. Configuring the Switch Table 3 2 EWS Menu Options IP Addressing Provides information for configuring IP addressing In additon 3 46 this section contains information for defining ARP DHCP and DNS settings SNMP Provides information for configuring SNMP 3 76 Web View Management Provides information for configuring system passwords and 3 90 web access RMON Provides information for viewing RMON statistics 3 211 Physical Provides information for managing P ower over Ethernet devices and system diagnostics Ethernet Provides information for managing PoE devices and viewing 3 42 PoE statistics Diagnostics Provides information for performing copper and fiber cable tests 3 132 performing port mirroring and viewing device health information Security Traffic Control Provides information for configuring Broadcast S torm Control 3 132 and port security 802 1X Provides information for configuring 802 1X portauthentication 3 109 Access Control Provides information for configuring Access Control Lists and 3 120 Access Control Enteries as well as information for binding ACLs to interfaces Layer 2 Address Tables Provides information for defining static and dynamic addresses 3 141 Spanning Tree Provides information for configuring the Spanning Tree Protocol 3 145 the Rapid Spanning Tree and Multiple S panning Tree VLAN Provides information fo
2. Command Function Mode Page snmp server Configures the community access string to permit access to the GC 4 452 community SNMP server To remove the specified community string use the no form of this command snmp server view Creates or updates a Simple Network Management Protocol GC 4 453 SNMP server view entry To remove a specified SNMP server view entry use the no form of this command snmp server group Configures a new Simple ManagementP rotocol SNMP group or GC 4 454 a table that maps SNMP users to SNMP views To remove a specified SNMP group use the no form of this command snmp server user Configures a new SNMP Version 3 user To remove a user use GC 4 455 the no form of this command snmp server Specifies the Simple Network Management Protocol SNMP GC 4 457 engineid local enginelD onthe local device To remove the configured engine ID use the no form of this command snmp server enable Enables the device to send SNMP traps To disable SNMP traps GC 4 458 traps use the no form of the command snmp server filter Creates or updates a Simple Network Management Protocol GC 4 459 SNMP server filter entry To remove the specified SNMP server filter entry use the no form of this command snmp server host Specifies the recipient of Simple Network Management Protocol GC 4 459 Version 1 or Version 2c notifications To remove the specified host use the no form of thi
3. Function Parameter Default IP Settings IP Address none Subnet Mask none Default Gateway none DHCP disabled BOOTP enabled if configuration is empty and there is no command line activity within 60 seconds DNS Server Domain Lookup enabled Multicast Filtering IGMP Snooping disabled System Log Status on Messages Logged 200 Messages Logged to Flash 200 SNTP Clockset 0 00 J an 1 2000 Clock source internal Daylight Savings disabled SNTP no servers defined Port Security Port Lock disabled Multicast Forwarding IGMP Snooping Global disabled IGMP Snooping Interface disabled Multicast TV VLAN disabled SSH Server enabled SSL Server enabled RADIUS RADIUS server none defined TACACS TACACS server none defined 1 9 1 Introduction 1 10 Chapter 2 Initial Configuration This section describes the initial device configuration and includes the following topics e General Configuration Information e Booting the Switch e Configuration Overview e Advanced Configuration Software Download and Reboot e Startup Menu Functions After completing all external connections connect a terminal to the device to monitor the boot and other procedures The order of installation and configuration procedures is illustrated in the following figure For the initial configuration the standard device configuration is performed Other functions can be performed but doing so suspends the installation process and causes
4. This command lists concurrent telnet connections to remote hosts that were opened by the current telnet session to the local device It does not list telnet connections to remote hosts that were opened by other telnet sessions Example The following example displays connecting to 176 213 10 50 via Telnet console gt telnet 176 213 10 50 Esc U sends telnet EL 4 540 System Management Commands 4 Related Commands resume resume The resume User EXEC mode command enables switching to another open Telnet session Syntax resume connection connection The connection number Range 1 4 connections Default Setting The default connection number is that of the most recent connection Command Mode User EXEC mode Command Usage There are no user guidelines for this command Example The following command switches to open Telnet session number 1 console gt resume 1 Related Commands telnet reload The reload Privileged EXEC mode command reloads the operating system Syntax reload Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage Caution should be exercised when resetting the device to ensure that no other activity is being performed In particular the user should verify that no configuration files are being downloaded at the time of reset 4 541 4 Command Line Interface Example The following example relo
5. 4 493 4 Command Line Interface Related Commands spanning tree mst priority spanning tree mst max hops spanning tree mst port priority spanning tree mst cost spanning tree mst configuration instance mst name mst revision mst show mst exit mst show spanning tree spanning tree guard root The spanning tree guard root Interface Configuration Ethernet port channel mode command enables root guard on all spanning tree instances on the interface Root guard prevents the interface from becoming the root port of the device To disable root guard on the interface use the no form of this command Syntax spanning tree guard root no spanning tree guard root Default Setting Root guard is disabled Command Mode Interface Configuration Ethernet port channel mode Command Usage Root guard can be enabled when the device operates in STP RSTP and MSTP When root guard is enabled the port changes to the alternate state if spanning tree calculations selects the port as the root port Example The following example prevents Ethernet port 1 g1 from being the root port of the device console config interface ethernet 1 gl console config mst spanning tree guard root 4 494 Spanning Tree Commands 4 Related Commands show spanning tree show spanning tree The show spanning tree Privileged EXEC mode command displays spanning tree configuration Syntax show spanning tree e
6. Console gt show line Console configuration Interactive timeout Disabled History 10 Baudrate 9600 Databits 8 Parity none Stopbits 1 Telnet configuration Interactive timeout 10 minutes 10 seconds History 10 SSH configuration Interactive timeout 10 minutes 10 seconds History 10 Related Commands line speed autobaud exec timeout history history size terminal history terminal history size 4 383 4 Command Line Interface Management ACL Commands Table 4 18 Management ACL Commands Command Function Mode Page management Configures a management access list and enters the GC 4 384 access list Management Access list Configuration command mode To delete an access list use the no form of this command permit Defines a permit rule ACL 4 385 Management deny Defines a deny rule ACL 4 386 Management management Restricts management connections by defining the active GC 4 387 access class management access list To disable this restriction use the no form of this command show management Shows information for all management access lists configured in PE 4 388 access list device show management Shows active management access list information PE 4 389 access class management access list The management access list Global Configuration mode command configures a management access list and enters the Management Access list Configuration comm
7. IP Protocol Abbreviated Name Protocol Number Internet Control Message P rotocol icmp 1 Internet Group Management Protocol igmp 2 IP in IP encapsulation Protocol ipinip 4 Transmission Control Protocol tcp 6 Exterior Gateway Protocol egp 8 Interior Gateway Protocol igp 9 User Datagram Protocol udp 17 Host Monitoring Protocol hmp 20 Reliable Data P rotocol rdp 27 Inter Domain Policy Routing Protocol idpr 35 Ipv6 protocol ipv6 41 Routing Header for IP v6 ipv6 route 43 Fragment Header for IP v6 ipv6 frag 44 Inter Domain R outing Protocol idrp 45 Reservation Protocol rsvp 46 General Routing Encapsulation gre 47 Encapsulating Security Payload 50 esp 50 Authentication Header ah 51 ICMP for IP v6 ipv6 icmp 58 EIGRP routing protocol eigrp 88 Open Shortest Path Protocol ospf 89 Protocol Independent Multicast pim 103 Layer Two Tunneling Protocol l2tp 115 ISIS over IP v4 isis 124 any IP protocol any 25504 DSCP Indicates matching the dscp number with the packet DSCP value ip precedence Indicates matching ip precedence with the packet ip precedence value 4 267 4 Command Line Interface icmp type Specifies an ICMP message type for filtering ICMP packets Enter a value or one of the following values echo reply destination unreachable source quench redirect alternate host address echo request router advertisement router solicitation time exceeded parameter problem timestamp timestamp reply
8. Console config aaa authentication login default line 4 255 Console config aaa authentication enable default line 4 257 Console config line console 4 377 Console config line login authentication default 4 258 Console config line enable authentication default 4 259 Console config line password george 4 262 When initially logging on to a device through a console session enter george at the password prompt When changing a device s mode to enable enter george at the password prompt Configuring an Initial Telnet Password To configure an initial Telnet password enter the following commands Console config aaa authentication login default line 4 255 Console config aaa authentication enable default line 4 257 Console config line telnet 4 377 Console config line login authentication default 4 258 Console config line enable authentication default 4 259 Console config line password bob 4 262 When initially logging onto a device through a Telnet session enter bob at the password prompt When changing a device mode to enable enter bob Configuring an Initial SSH password To configure an initial SSH password enter the following commands Console config aaa authentication login default line 4 255 Console config aaa authentication enable default line 4 257 Console config line ssh 4 377 Console config line login authentication default 4 258 Console config line enable auth
9. Console gt show rmon statistics ethernet 1 el Port 1 el Octets 878128 Packets 978 Broadcast 7 Multicast 1 CRC Align Errors 0 Collisions 0 Undersize Pkts 0 Oversize Pkts 0 Fragments 0 Jabbers 0 64 Octets 98 65 to 127 Octets 0 128 to 255 Octets 0 256 to 511 Octets 0 512 to 1023 Octets 491 1024 to 1518 Octets 389 4 437 4 Command Line Interface The following table describes significant fields shown above Field Description Octets The total number of octets of data including those in bad packets received on the network excluding framing bits but including FCS octets Packets The total number of packets including bad packets broadcast packets and multicast packets received Broadcast The total number of good packets received and directed to the broadcast address This does not include multicast packets Multicast The total number of good packets received and directed to a multicast address This number does not include packets directed to the broadcast address CRC Align Errors The tota number of packets received with a length excluding framing bits but including FCS octets of between 64 and 1518 octets inclusive but with either a bad Frame Check Sequence FCS with an integral number of octets FCS Error ora bad FCS with a non integral number of octets Alignment Error Collisions The best estimate of the total number of collisions on this Ethernet seg
10. Event Description Time 1 Errors Jan 18 2002 23 48 19 1 Errors Jan 18 2002 23 58 17 4 449 4 Command Line Interface Console gt show rmon log 1 Maximum table size 500 800 after reset Event Description Time 1 Errors Jan 18 2002 23 48 19 1 Errors Jan 18 2002 23 58 17 The following table describes the significant fields shown in the display Field Description Event An index that uniquely identifies the event Description A comment describing this event Time The time this entry was created Related Commands rmon event show rmon events rmon table size The rmon table size Global Configuration mode command configures the maximum size of RMON tables To return to the default configuration use the no form of this command Syntax rmon table size history entries log entries no rmon table size history log e history entries Maximum number of history table entries Range 20 270 log entries Maximum number of log table entries Range 20 100 Default Setting History table size is 270 Log table size is 200 Command Mode Global Configuration mode Command Usage The configured table size taskes effect after the device is rebooted 4 450 Example SNMP Commands 4 The following example configures the maximum RMON history table sizes to 100 entries Console config rmon table size history 100 SNMP Commands Table 4 26 SNMP Commands
11. Related Commands lacp port priority show lacp ethernet show lacp port channel show lacp ethernet The show lacp ethernet Privileged EXEC mode command displays LACP information for Ethernet ports Syntax show lacp ethernet interface parameters statistics protocol state e interface Valid Ethernet port Full syntax unit port parameters Link aggregation parameter information e statistics Link aggregation statistics information protocol state Link aggregation protocol state information Default Setting This command has no default configuration 4 373 4 Command Line Interface Command Mode Privileged EXEC mode Command Usage All LACP statistics is shown if no keyword is specified LACP should be enabled for selected Ethernet port Example The following example display LACP information for Ethernet port 1 e1 Console show lacp ethernet 1 e1 Port 1 el LACP parameters Actor system priority 2 system mac addr 00 00 12 34 56 78 port Admin key 30 port Oper key 30 port Oper number 21 port Admin priority 1 port Oper priority 1 port Admin timeout LONG port Oper timeout LONG LACP Activity ACTIVE Aggregation AGGREGATABLE synchronization FALSE collecting FALSE distributing FALSE expired FALSE Partner system priority 0 system mac addr 00 00 00 00 00 00 port Admin key 0 port Oper key 0 port Oper number 0 port Admin priority 0 port Oper priority 0 port Oper timeo
12. Spanning Tree Commands Enable or disable spanning tree functionality display spanning tree 4 470 configuration and configures STP port priority SSH Commands Display the SSH public keys on the device SSH server configuration 4 510 or which SSH public key is manually configured Syslog Commands Log messages to a syslog server or limit log messages to a syslog 4 521 server System Management Commands Display and list system version or Telnet session information 4 533 TACACS Commands Display configuration and statistical information about a TACACS 4 551 server or specify a TACACS host User Interface Commands Enter the Global Configuration mode enter the Privileged EXEC 4 556 mode or return to the User EXEC mode VLAN Commands Enter the VLAN Configuration mode enable simultaneously 4 564 configuring multiple VLANs or adds or remove VLANs Web Server Commands Enable configuring the device from a browser or display the HTTP 4 594 server configuration The access mode shown in the following tables is indicated by these abbreviations NE Normal Exec PE Privileged Exec IC Interface Configuration LC Line Configuration GC Global Configuration VC VLAN Database Configuration ACL Access Control List Configuration MST Multiple Spanning Tree ICE Interface Configuration Ethernet ICV Interface Configuration VLAN CMC Class Map Configuration PCC Policy
13. Figure 3 6 Stack Management Topology Page It is recommended to upgrade software on all units in a stack simultaneously Use the following steps 1 Download the file 2 Open File Download Page 3 Select the Firmware Download field 4 Enter full path and file name of software to be downloaded to device 5 Select Download to all Units 6 Reset the stack CLI The following is an example of stack management commands Console config stack master unit 2 4 543 Console config stack display order top 6 bottom 1 4 544 Resetting the Stack The Stack Management Reset Page resets the stack 3 40 Resetting the Stack 3 Web Click System System Mgmt Stack Stack Reset page Click the Reset Device button Figure 3 7 Stack Management Reset Page CLI The following is an example of stack reset commands Console Config stack reload unit 2 4 544 3 41 B Configuring the Switch Managing Power over Ethernet Devices Power over Ethernet PoE provides power to devices over existing LAN cabling without updating or modifying the network infrastructure Power over Ethernet removes the necessity of placing network devices next to power sources Power over Ethernet can be used in the following applications e IP Phones e Wireless Access Points e IP Gateways e PDAs e Audio and video remote monitoring Powered Devices are devices which receive power from the device power suppl
14. Unit Het cececceccececececeececeoceeccece ce Pata 1 234 5 FT es MN RH ME BTW wae we CIN OlOlclolololclolclciclclolclolclololclolclolclaic ololajolalolclolo G o c o ololclolelclclololcicl clojclololclol clal clololcjolololololo 6 6 6 6 6 0 0 0 6 6 010 6 c o 0 o c6 o o alclololcjol clololc calajo Patag 1 23 4 5 6 7 8 9 OH RD MS wo ececccececececacacececcececeece 6 6 6 6 60 0 6 6 6 c 6 6 c c o o c o o clolclclciolclololc clalolo elelolclclclelelclelclclclclc ele ciclelclolclelel lclelalajclalcle Figure 3 92 Multicast Forward All Page CLI The following is an example of the Multicast Forward All CLI commands 4 567 config interface vlan 1 Console Console config if bridge multicast forward all add ethernet 1 e3 4 281 4 561 Console config if end 3 195 B Configuring the Switch Specifying Static Interfaces for a Multicast Group The Multicast Group Page displays the ports and LAGs attached to the Multicast service group in the Ports and LAGs tables The Port and LAG tables also reflect the manner in which the port or LAGs joined the Multicast group Ports can be added either to existing groups or to new Multicast service groups The Multicast Group Page permits new Multicast service groups to be created The Multicast Group Page also assigns ports to a specific Multicast service address group The following table contains the IGMP port and LAG members management settings
15. 4 446 RMON Commands 4 Startup Alarm The alarm that may be sent when this entry is first set If the first sample is greater than or equal to the rising threshold and startup alarm is equal to rising or rising and falling then a single rising alarm is generated If the first sample is less than or equal to the falling threshold and startup alarm is equal falling or rising and falling then a single falling alarm is generated Rising Threshold A sampled statistic threshold When the current sampled value is greater than or equal to this threshold and the value at the last sampling interval is less than this threshold a single eventis generated Falling Threshold A sampled statistic threshold When the current sampled value is less than or equal to this threshold and the value at the last sampling interval is greater than this threshold a single event is generated Rising Event The event index used when a rising threshold is crossed Falling Event The event index used when a falling threshold is crossed Owner The entity that configured this entry Related Commands rmon alarm show rmon alarm table rmon event The rmon event Global Configuration mode command configures an event To remove an event use the no form of this command Syntax rmon event index type community text description text owner name no rmon event index e index Specifies the event index Range 1 6553
16. From the last weekend of March until the last weekend of October Belgium From the last weekend of March until the last weekend of October e Brazil From the third Sunday in October until the third Saturday in March During the period of Daylight Saving Time Brazilian clocks go forward one hour in most of the Brazilian southeast e Chile In Easter Island from March 9 until October 12 In the rest of the country from the first Sunday in March or after 9th March e China China does not use Daylight Saving Time e Canada From the first Sunday in April until the last Sunday of October Daylight Saving Time is usually regulated by provincial and territorial governments Exceptions may exist in certain municipalities e Cuba From the last Sunday of March to the last Sunday of October e Cyprus From the last weekend of March until the last weekend of October Denmark From the last weekend of March until the last weekend of October Egypt From the last Friday in April until the last Thursday in September e Estonia From the last weekend of March until the last weekend of October e Finland From the last weekend of March until the last weekend of October e France From the last weekend of March until the last weekend of October e Germany From the last weekend of March until the last weekend of October e Greece From the last weekend of March until the last weekend of October
17. Related Commands bridge multicast filtering bridge multicast forbidden address bridge multicast forward all bridge multicast forbidden forward all 4 292 Address Table Commands 4 show ports security The show ports security Privileged EXEC mode command displays the port lock status Syntax show ports security ethernet interface port channel port channel number e interface A valid Ethernet port e port channel number A valid port channel number Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays all classes of port lock status entries Console show ports security Port Status Learning Action Maximum Trap Frequency 1 el Locked Dynamic Discard 3 Enable 100 1 e2 Unlocked Dynamic 28 1 e3 Locked Disabled Discard 8 Disable Shutdown The following tables describes the fields shown above Field Description Port Port number Status Locked Unlocked Learning Learning mode Action Action on violation Maximum Maximum addresses that can be associated on this port in Static Learning mode or in Dynamic Learning mode Trap Indicates if traps are sentin case of a violation Frequency Minimum time between consecutive traps 4 293 4 Command Line Interface Related Commands port security mode port security max show ports secu
18. Severe error messages that are logged to flash memory are permanently stored in the switch to assist in troubleshooting network problems Up to 256 log entries can be stored in the flash memory with the oldest entries being overwritten first when the available log memory 256 kilobytes has been exceeded When a severity level is selected all severity level choices above the selection are selected automatically The Memory Logs Page allows you to configure and limit system messages that are logged to flash or RAM memory Command Attributes Log Index Displays the log number Log Time Displays the time at which the log was generated Severity The following are the available log severity levels e Emergency The highest warning level If the device is down or not functioning properly an emergency log message is saved to the specified logging location e Alert The second highest warning level An alert log is saved if there is a serious device malfunction for example all device features are down Critical The third highest warning level A critical log is saved if a critical device malfunction occurs for example two device ports are not functioning while the rest of the device ports remain functional e Error A device error has occurred for example if a single port is offline e Warning The lowest level of a device warning The device is functioning but an operational problem has occurred e Not
19. console show ip https HTTPS server enabled Port 443 Certificate 1 is active Issued by www verisign com Valid from 8 9 2004 to 8 9 2005 Subject CN router gm com 0 General Motors C US Finger print DC789788 DC88A988 127897BC BB789788 Certificate 2 is inactive Issued by self signed Valid from 8 9 2004 to 8 9 2005 Subject CN router gm com 0 General Motors C US Finger print 1873B936 88DC3411 BC8932EF 782134BA Related Commands ip https server ip https port ip https certificate 4 604 APPENDIX A SOFTWARE SPECIFICATIONS Software Features Authentication Local RADIUS TACACS Port 802 1x HTTPS SSH Port Security Access Control Lists IP MAC up to 32 lists AMAP Alcatel Mapping Adjacency Protocol SNMPv3 Management access via MIB database Trap management to specified hosts DHCP Client DNS Server Port Configuration 1000BASE T 10 100 1000 Mbps half full duplex 1000BASE SX LX 1000 Mbps full duplex Flow Control Full Duplex IEEE 802 3x Half Duplex Back pressure Broadcast Storm Control Traffic throttled above a critical threshold Port Mirroring Multiple source ports one destination port Rate Limits Input Limit Output limit Range configured per port Port Trunking Static trunks Cisco EtherChannel compliant Dynamic trunks Link Aggregation Control Protocol Spanning Tree Protocol Spanning Tree Protocol STP IEEE 802 1D Rapid Spanning Tree Protocol RSTP IEEE 802 1w M
20. console config interface ethernet 1 e16 console config if switchport general allowed vlan add 2 5 6 tagged Related Commands switchport mode switchport access vlan switchport trunk allowed vlan switchport trunk native vian switchport general pvid switchport general ingress filtering disable switchport general acceptable frame type tagged only switchport forbidden vian show interfaces switchport switchport access multicast tv vlan switchport general pvid The switchport general pvid Interface Configuration mode command configures the PVID when the interface is in general mode To return to the default configuration use the no form of this command Syntax switchport general pvid vian id no switchport general pvid vian id Specifies the PVID Port VLAN ID Default Setting If the default VLAN is enabled PVID 1 Otherwise PVID 4095 4 574 VLAN Commands 4 Command Mode Interface Configuration Ethernet port channel mode Command Usage There are no user guidelines for this command Example The following example configures the PVID for Ethernet port 1 e16 when the interface is in general mode console config interface ethernet 1 e16 console config if switchport general pvid 234 Related Commands switchport mode switchport access vlan switchport trunk allowed vlan switchport trunk native vlan switchport general allowed vlan switchport general ingress filtering disab
21. Checked Removes the selected SNMP community Unchecked Maintains the SNMP communities The The The The contains the following fields contains the following fields contains the following fields contains the following fields Management Station Displays the management station IP address for which the advanced SNMP community is defined Community String Defines the password used to authenticate the management station to the device Group Name Defines advanced SNMP community group names e Remove Removes a community The possible field values are Checked Removes the selected SNMP communities Unchecked Maintains the SNMP communities Web Click SNMP Communities Add new community strings as required select the access rights from the Access Mode drop down list then click Add Communities Base Table Management Station Community String Access Mode View Name Manage OOB Modify Remove 1 SNMP asmin Enabies 2 io Advanced Tabte Management Station Cammunity String Group Name Manage OOB Modity Remave 1 Enaties 2 io Figure 3 30 SNMP Communities Page CLI The following is an example of the SNMP Communities CLI commands Console config snmp server community public su 192 168 1 20 4 452 3 84 Configuring SNMP 3 Defining SNMP Notification Global Parameters The SNMP Notification Properties Page contains parameters for defining SNMP notification
22. Command Mode Interface Configuration Ethernet mode Command Usage There are no user guidelines for this command Example The following example enables powered device discovery protocol on port 1 e1 so that power will be supplied to a discovered device Console config interface ethernet 1 e1 Console config if power inline auto Related Commands power inline powered device power inline priority power inline usage threshold show power inline power inline powered device The power inline powered device Interface Configuration Ethernet mode command adds a comment or description of the powered device type to enable the 4 399 4 Command Line Interface user to remember what is attached to the interface To remove the description use the no form of this command Syntax power inline powered device pd type no power inline powered device pd type Specifies the type of powered device attached to the interface Range 1 24 characters Default Setting This command has no default configuration Command Mode Interface Configuration Ethernet mode Command Usage There are no user guidelines for this command Example The following example configures a description to an IP phone to a powered device connected to Ethernet interface 1 e1 Console config interface ethernet 1 e1 Console config if power inline powered device IP phone Related Commands power inline power inline priority
23. Configuring Quality of Service 3 CLI The following is an example of the CLI commands used to enable QoS Console config qos 4 406 Defining Global Queue Settings The Priority Queue Page contains fields for defining the QoS queue forwarding types The queue settings are set system wide Command Attributues Queue Displays the queue for which the queue settings are displayed The possible field range is 1 4 Strict Priority Indicates that traffic scheduling for the selected queue is based strictly on the queue priority WRR Indicates that traffic scheduling for the selected queue is based strictly on the WRR If WRR is selected the predetremined wieghts 8 2 4 and 1 for queues 4 3 2 and 1 WRR Weight Assigns WRR weights to queues This field is enabled only for queues in WRR queue mode If a queue is set to 0 weight the queue is not operational and is effectively closed If WRR is not selected this field is grayed out of WRR Bandwidth Displays the amount of bandwidth assigned to the queue Web Click Policy CoS Mode QueuePriority define the fields and click Apply Priority Queue Scheduling Queue Strict of WRR Priosiny WRR WRR Weight Bandwidth 1 G aaan G 3 c G Figure 3 80 Priority Queue Page CLI The following is an example of the CLI commands used to enable QoS 3 179 B Configuring the Switch Defining Bandwidth
24. Displays the interface used to manage the device Remove Removes the selected IP address from the interface The possible field values are Checked Removes the IP address from the interface e Unchecked Maintains the IP address assigned to the Interface Web Click IP IP Addressing IP Interface define the fields and and specify a Primary interface click Apply 3 46 Defining Default Gateways 3 IP Interface W Address Mash hatestace Modity Remove 10 6 39 242 255 MA 60 gh Cc Figure 3 10 IP Interface Page CLI The following is an example of the CLI commands for defining an IP interface Console config interface vlan 1 4 567 Console config if ip address 131 108 1 27 255 255 255 0 4 359 Defining Default Gateways Packets are forwarded to the default IP when frames are sent to a remote network via the default gateway The configured IP address must belong to the same subnet as one of the IP interfaces The Default Gateway Page contains parameters for defining default gateways Command Attributes User Defined Default Gateway Defines the default gateway IP address Active Default Gateway Indicates if the default gateway is active The possible field values are Checked Activates the default gateway e Unchecked Maintains the default gateway as inactive This is the default value e Remove Removes the default gateway The possible field val
25. Indicates that the RMON statistics are refreshed every 60 seconds Drop Events Displays the number of dropped events that have occurred on the interface since the device was last refreshed Received Bytes Octets Displays the number of octets received on the interface since the device was last refreshed This number includes bad packets and FCS octets but excludes framing bits e Received Packets Displays the number of packets received on the interface including bad packets Multicast and broadcast packets since the device was last refreshed Broadcast Packets Received Displays the number of good broadcast packets received on the interface since the device was last refreshed This number does not include Multicast packets Multicast Packets Received Displays the number of good Multicast packets received on the interface since the device was last refreshed e CRC amp Align Errors Displays the number of CRC and Align errors that have occurred on the interface since the device was last refreshed Undersize Packets Displays the number of undersized packets less than 64 octets received on the interface since the device was last refreshed Oversize Packets Displays the number of oversized packets over 1518 octets received on the interface since the device was last refreshed Fragments Displays the number of fragments packets with less than 64 octets excluding framing bits but includ
26. Static configuration PVID 2922 Ingress Filtering Enabled Acceptable Frame Type Untagged GVRP status Disabled Related Commands switchport mode switchport access vlan switchport trunk allowed vlan switchport trunk native vian switchport general allowed vian switchport general pvid switchport general ingress filtering disable switchport general acceptable frame type tagged only switchport forbidden vian switchport access multicast tv vlan switchport access multicast tv vlan The switchport access multicast tv vlan interface configuration mode command enables receiving Multicast transmissions from a VLAN that is not the Access port VLAN while keeping the L2 segregation with subscribers on different Access port VLANs Use the no form of this command to disable receiving Multicast transmissions Syntax switchport access multicast tv vlan vian id no switchport access multicast tv vlan 4 584 VLAN Commands 4 e vian id VLAN ID of the Multicast TV VLAN Default Configuration Multicast TV VLAN disabled Command Mode Interface Configuration Ethernet port channel mode Command Usage The user can receive multicast transmit transmissions on the multicast TV VLAN but cannot transmit All IGMP reports are associated with the multicast TV VLAN Example The following example configures Multicast TV VLAN 20 on Ethernet port 1 e16 console config interface ethernet 1 e16 console config if swit
27. Status Displays the SNTP server operating status Last Response Displays the last time a response was received from the SNTP server Offset Indicates the time difference between the device local clock and the acquired time from the SNTP server Delay Indicates the amount of time it takes for a device request to reach the SNTP server Remove Removes SNTP servers from the SNTP server list The possible field values are Checked Removes the SNTP server Unchecked Maintains the SNTP server This is the default value Web Select System Mgmt SNTP Servers Define the fields and click Apply SNTP Servers SNIP Server Poll leterval Encryption Key ID Preference Stamm Last Response Offset Delay Medity Remeve wit Enable 4 ce Figure 3 24 SNTP Servers Page 3 74 Configuring SNTP 3 CLI The following is an example of the SNTP server commands Console config sntp server 192 1 1 1 4 310 Defining SNTP Interface Settings The SNTP Interface Page contains fields for setting SNTP on different interfaces Command Attributes Interface Indicates the interface on which SNTP can be enabled The possible field values are e Port Indicates the specific port number on which SNTP is enabled LAG Indicates the specific LAG number on which SNTP is enabled e VLAN Indicates the specific VLAN number on which SNTP is enabled Receive Servers Updates Enables the int
28. console clear logging Clear logging buffer confirm Related Commands logging logging buffered show logging logging file The logging file Global Configuration mode command limits syslog messages sent to the logging file based on severity To cancel using the buffer use the no form of this command Syntax logging file evel no logging file e level Specifies the severity level of syslog messages sent to the logging file Possible values emergencies alerts critical errors warnings notifications informational and debugging Default Setting The default severity level is errors Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example limits syslog messages sent to the logging file based on severity level alerts console config logging file alerts Related Commands logging clear logging file show logging 4 526 Syslog Commands 4 clear logging file The clear logging file Privileged EXEC mode command clears messages from the logging file Syntax clear logging file Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example clears messages from the logging file console clear logging file Clear Logging File confirm Related Commands logging logging fil
29. name Specifies the host entry to be removed Range 1 158 characters e Removes all entries Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage This command deletes the host name to address mapping temporarily until the next renewal of the IP address 4 369 4 Command Line Interface Example The following example deletes all entries from the host name to address mapping Console clear host dhcp Related Commands clear host show hosts show hosts The show hosts Privileged EXEC mode command displays the default domain name a list of name server hosts the static and the cached list of host names and addresses Syntax show hosts name name Specifies the host name Range 1 158 characters Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays host information Console show hosts System name Device Default domain is gm com sales gm com usa sales gm com DHCP Name address lookup is enabled Name servers Preference order 176 16 1 18 176 16 1 19 Configured host name to address mapping Host Addresses accounting gm com 176 16 8 8 176 16 8 9 DHCP Cache TTL Hours 4 370 LACP Commands 4 Host Total Elapsed Type Addresses www stanford edu 72 3 IP 17
30. oid tree Specifies the object identifier of the ASN 1 subtree to be included or excluded from the view To identify the subtree specify a text string consisting of numbers such as 1 3 6 2 4 or a word such as system Replace a single subidentifier with the asterisk wildcard to specify a subtree family for example 1 3 4 e included lIndicates that the filter type is included e excluded lIndicates that the filter type is excluded Default Setting No filter entry exists Command Mode Global Configuration mode Command Usage This command can be entered multiple times for the same filter record Later lines take precedence when an object identifier is included in two or more lines Example The following example creates a filter that includes all objects in the MIB II system group except for sysServices System 7 and all objects for interface 1 in the MIB II interfaces group console config snmp server filter filter name system included console config snmp server filter filter name system 7 excluded console config snmp server filter filter name ifEntry 1 included Related Commands show snmp filters snmp server host The snmp server host Global Configuration mode command specifies the recipient of Simple Network Management Protocol Version 1 or Version 2 notifications To remove the specified host use the no form of this command 4 459 4 Command Line Interface Syntax snmp server host
31. Defines the IP address assigned to the VLAN group Prefix Defines the IP address s prefix The possible field range is 0 32 Web Click VLAN VLAN Groups Protocol based VLAN Groups Define the fields and click Apply Protocol Based VLAN Groups Group ID Frame Type Protocol Vabee Medity Remove 4 G Figure 3 74 Protocol Based VLAN Groups Page CLI The following is an example of the CLI commands used to create Protocol Based VLAN groups map protocol protocols group 4 595 switchport general map protocols group vlan 4 596 show vlan protocols groups 4 596 3 166 Configuring VLANs 3 Mapping Groups to VLANs The classification places the interface into a protocol group Command Attributes e Group Type Defines the VLAN Group to which interfaces are mapped The possible field values are e MAC based Indicates that interfaces are mapped to MAC based VLAN groups e Subnet based Indicates that interfaces are mapped to Subnet based VLAN groups e Protocol based Indicates that interfaces are mapped to Protocol based VLAN groups e Interface Indicates the interface type the VLAN group The possible field values are e Port Indicates the specific port added to the VLAN group e LAG Indicates the specific LAG added to the VLAN group e Group ID Defines the protocol group ID to which the interface is added e VLAN ID Attaches the interface to a user defined VLAN ID VLA
32. Eaa Figure 3 22 SNTP Configuration Global Settings Page CLI The following is an example of the SNTP global parameters commands Console config sntp client poll timer 120 4 306 Console config sntp broadcast client enable 4 306 Console config sntp unicast client enable 4 309 Console config sntp anycast client enable 4 307 Console config sntp unicast client poll 4 310 Defining SNTP Authentication The SNTP Authentication Page provides parameters for defining the means by which the SNTP server is authenticated Command Attributes e Enable SNTP Authentication Indicates if authenticating an SNTP session between the device and an SNTP server is enabled on the device The possible field values are e Checked Authenticates SNTP sessions between the device and SNTP server e Unchecked Disables authenticating SNTP sessions between the device and SNTP server e Encryption Key ID Indicates if the encryption key identification is used to authenticate the SNTP server and device The field value is up to 4294967295 3 72 Configuring SNTP 3 e Authentication Key Indicates the key used for authentication Trusted Key Indicates the encryption key used Unicast Anycast or elected Broadcast to authenticate the SNTP server e Remove Removes Encryption Key IDs The possible field values are e Checked Removes the selected Encryption Key ID e Unchecked Maintains the Encryption K
33. Example The following example assigns a threshold of 80 percent to WRR queue 1 Console config qos wrr queue threshold gigabitethernet 1 Related Commands show qos interface qos map dscp dp The qos map dscp dp global configuration mode command maps DSCP to Drop Precedence To return to the default setting use the no form of this command Syntax qos map dscp dp dscp list to do no qos map dscp dp e dscp list Specifies up to 8 DSCP values separated by a space Range 0 63 dpo Enter the Drop Precedence value to which the DSCP value corresponds Possible values are 0 2 where 2 is the highest Drop 4 423 4 Command Line Interface Precedence Default Setting All the DSCPs are mapped to Drop Precedence 0 Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example maps DSCP to Drop Precedence console config qos map dscp dp 0 to 63 Related Commands qos dscp mutation qos map dscp mutation show qos qos map policed dscp The qos map policed dscp Global Configuration mode command modifies the policed DSCP map for remarking purposes To return to the default map use the no form of this command Syntax qos map policed dscp dscp list to dscp mark down no qos map policed dscp dscp list Specifies up to 8 DSCP values separated by a space Range 0 63 dscp mark down Specifies the DSCP value to
34. Range 1 160 characters The following table displays keywords and URL prefixes Keyword Source or Destination flash Source or destination URL for flash memory It s the default in case a URL is specified without a prefix startup config Represents the startup configuration file Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage sys prv image 1 and image 2 files cannot be deleted 4 318 Configuration and Image File Commands 4 Example The following example deletes file test from flash memory Console delete flash test Delete flash test confirm Related Commands copy show running config show startup config boot system The boot system Privileged EXEC mode command specifies the system image that the device loads at startup Syntax boot system unit unif image 1 image 2 e unit Specifies the unit number image 1 Specifies image 1 as the system startup image image 2 Specifies image 2 as the system startup image Default Setting If the unit number is unspecified the default setting is the master unit number Command Mode Privileged EXEC mode Command Usage Use the show bootvar command to find out which image is the active image Example The following example loads system image 1 at device startup Console boot system image 1 Related Commands show bootvar show running config The sho
35. Related Commands sntp authenticate sntp trusted key sntp client poll timer sntp broadcast client enable sntp anycast client enable sntp unicast client enable sntp unicast client poll sntp authenticate The sntp authenticate Global Configuration mode command grants authentication for received Simple Network Time Protocol SNTP traffic from servers To disable the feature use the no form of this command Syntax sntp authenticate no sntp authenticate Default Setting No authentication Command Mode Global Configuration mode Command Usage The command is relevant for both unicast and broadcast Example The following example defines the authentication key for SNTP and grants authentication Console config sntp authentication key 8 md5 ClkKey Console config sntp trusted key 8 Console config sntp authenticate Related Commands sntp authentication key sntp trusted key sntp client poll timer 4 304 Clock Commands 4 sntp broadcast client enable sntp anycast client enable sntp unicast client enable sntp unicast client poll sntp trusted key The sntp trusted key Global Configuration mode command authenticates the identity of a system to which Simple Network Time Protocol SNTP will synchronize To disable authentication of the identity of the system use the no form of this command Syntax sntp trusted key key number no sntp trusted key kKey number e key number Key numbe
36. Syntax do The EXEC command to be executed Default Setting This command has no default configuration Command Mode All configuration modes Command Usage There are no user guidelines for this command Example The following example executes an EXEC level command show vlan from the Global Configuration mode Console Config do show vlan VLAN Name Port Type Authorization 1 default 2 1 4 1 1 2 other Required 10 VLANO010 1 3 4 dynamic Required 11 VLANOO11 1 1 2 static Required 20 VLAN0020 1 3 4 static Required 21 VLAN0021 static Required 30 VLANO0030 static Required 31 VLAN0031 static Required 4 557 4 Command Line Interface 91 1 1 2 static Not required 3928 Guest VLAN 1 17 static Guest Related Commands All the show commands enable The enable User EXEC mode command enters the Privileged EXEC mode Syntax enable privilege level privilege level Privilege level to enter the system Range 1 15 Default Setting The default privilege level is 15 Command Mode User EXEC mode Command Usage There are no user guidelines for this command Example The following example enters Privileged EXEC mode console gt enable enter password console Related Commands disable disable The disable Privileged EXEC mode command returns to the User EXEC mode Syntax disable privilege level e privilege level Privilege level to enter the system Range 1 15
37. Table 3 1 IGMP Port LAG Members Table Control Settings Port Control Definition D Dynamically joins ports LAG to the Multicast group in the Current Row S Attaches the portto the Multicast group as static member in the Static Row The port LAG has joined the Multicast group statically in the Current Row F Forbidden ports are not included the Multicast group even if IGMP snooping designated the port to join a Multicast group Blank The portis not attached to a Multicast group Command Attributes e Enables Bridge Multicast Filtering Indicate if bridge Multicast filtering is enabled on the device The possible field values are e Checked Enables Multicast filtering on the device e Unchecked Disables Multicast filtering on the device If Multicast filtering is disabled Multicast frames are flooded to all ports in the relevant VLAN Disabled is the default value e VLAN ID Identifies a VLAN and contains information about the Multicast group address e Bridge Multicast Address Identifies the Multicast group MAC address IP address e Ports Displays Port that can be added to a Multicast group 3 196 Multicast Filtering 3 WebView Multicast Group Enable Dibya Multicast Fitesing M Pet f iag Modity Remove vami ie FASE TES MN NONE KTH 9 2I 22 29 24 ANAR UE L6 T E 00 oo _ eee Figure 3 93 Multicast Group Page CLI The following is an example of the Multicast Group CLI command
38. The default bridge priority for IEEE Spanning Tree Protocol STP is 32768 Command Modes Global Configuration mode Command Usage The bridge with the lowest priority is elected as the root bridge Example The following example configures spanning tree priority to 12288 Console config spanning tree priority 12288 Related Commands spanning tree forward time spanning tree hello time spanning tree max age spanning tree disable spanning tree cost spanning tree port priority spanning tree portfast spanning tree link type show spanning tree spanning tree disable The spanning tree disable Interface Configuration mode command disables spanning tree on a specific port To enable spanning tree on a port use the no form of this command 4 476 Spanning Tree Commands 4 Syntax spanning tree disable no spanning tree disable Default Setting Spanning tree is enabled on all ports Command Modes Interface Configuration Ethernet port channel mode Command Usage There are no user guidelines for this command Example The following example disables spanning tree on Ethernet port 1 e5 Console config interface ethernet 1 e5 Console config if spanning tree disable Related Commands spanning tree forward time spanning tree hello time spanning tree max age spanning tree priority spanning tree cost spanning tree port priority spanning tree portfast spanning tree link type show spanning t
39. The stack master global configuration mode command enables forcing the selection of a stack master To return to the default configuration use the no form of this command Syntax stack master unit unit no stack master e unit New master unit number Range 1 2 Default Setting Disables forcing the selection of a stack master Command Mode Global Configuration mode Command Usage The following algorithm is used to select a unit as the master e If only one master enabled unit is in the stack 1 or 2 it becomes the master e If aunit configured as a forced master it becomes the master If a forced master unit is removed from a stack and placed in a different stack with another forced master unit both are considered to be forced and the election criteria continue as follows e The unit with the longer up time is elected master Units are considered to have the same up time if they were powered up within ten minutes of each other e If both forced master units have the same up time Unit 1 is elected 4 543 4 Command Line Interface Example The following example selects Unit 2 as the stack master console config stack master unit 2 Related Commands stack reload stack display order show stack stack reload The stack reload Privileged EXEC mode command reloads stack members Syntax stack reload unit unit e unit Number of the unit to be reloaded Range 1 8 Default Setting All u
40. called a policy The policy can contain both ACLs and QoS rules The user can apply the policy to an interface see Advanced QoS Mode Simple In the simple form a single MAC or IP ACL is applied to an interface Although a policy cannot be applied to an interface it is possible to apply basic QoS rules that classify packets to output queues see Basic QoS Mode Mapping to Queues Queues are used in both Basic and Advanced QoS modes Default settings are applied to maps in Service QoS mode A Trust Behavior can be selected or the output service fields can be selected including e VLAN Priority Tags VPT VPTs are mapped to an output queues based on the VPT While queue mapping is user configurable the VPT default mapping to the output queue is as follows In the VPT default mapping Queue 1 has the lowest priority The following table contains the VPT to Queue default settings 3 175 B Configuring the Switch Tahe 34 VPT Default Mapping Table VPT Value Queue Number 4 DOD WV AeA Ww N mae O a gt F w w N e me N Note Mapping of the VPT to the output queue is performed on a system wide basis and can be enabled or disabled per port e Default CoS Packets arriving untagged are assigned to a default VPT which can be set by the user on a per port basis Once the VPT is assigned the packet is treated as if it had arrived with this tag The VPT mapping to the output queue is based on the sam
41. committed rate bps Specifies the average traffic rate CIR in bits per second bps e excess burst byte Specifies the normal burst size CBS in bytes drop Indicates that when the rate is exceeded the packet is dropped policed dscp transmit Indicates that when the rate is exceeded the DSCP of the packet is remarked dscp Specifies the value that the DSCP would be remarked If unspecified the DSCP would be remarked according to the policed DSCP map as configured by the qos map policed dscp Global Configuration mode command Default Setting No aggregate policer is define Command Mode Global Configuration mode Command Usage Define an aggregate policer if the policer is shared with multiple classes Policers in one port cannot be shared with other policers in another device traffic from two different ports can be aggregated for policing purposes An aggregate policer can be applied to multiple classes in the same policy map An aggregate policer cannot be applied across multiple policy maps An aggregate policer cannot be deleted if it is being used in a policy map The no police aggregate Policy map Class Configuration command must first be used to delete the aggregate policer from all policy maps Policing uses a token bucket algorithm CIR represents the speed with which the token is removed from the bucket CBS represents the depth of the bucket Example The following example defines the p
42. dscp queue the no form of this command qos trust Global Configures the system to the basic mode and truststate To return GC 4 426 to the untrusted state use the no form of this command qos cos Defines the default CoS value of a port To return to the default IC 4 427 configuration use the no form of this command qos dscp mutation Applies the DSCP Mutation map to a system DSCP trusted port GC 4 428 To return to the trust state with no DSCP mutation use the no form of this command qos map Modifies the DSCP to DSCP mutation map To return to the GC 4 428 dscp mutation default DSCP to DSCP mutation map use the no form of this command qos The qos Global Configuration mode command enables quality of service QoS on the device To disable QoS on the device use the no form of this command Syntax qos basic advanced no qos basic QoS basic mode This mode is applied if no keyword is specified advanced QoS advanced mode which enables the full range of QoS configuration Default Setting The QoS basic mode is enabled Command Mode Global Configuration mode Command Usage There are no user guidelines for this command 4 406 QoS Commands 4 Example The following example enables QoS on the device Console config qos Related Commands show qos show gos The show qos User EXEC mode command displays the quality of service QoS mode for the device Syn
43. secure The address is deleted after the port changes mode to unlock learning no port security command This parameter is only available when the port is in the learning locked mode 4 271 4 Command Line Interface Default Setting No static addresses are defined The default mode for an added address is permanent Command Mode Interface Configuration VLAN mode Command Usage Using the no form of the command without specifying a MAC address deletes all static MAC addresses belonging to this VLAN On interfaces that have an IP address configuerd use the command port security routed secure address to configure an address with secure option Example The following example adds a permanent static MAC layer station source address 3aa2 64b3 a245 on port 1 e16 to the bridge table Console config interface vlan 2 Console config if bridge address 3aa2 64b3 a245 ethernet 1 e16 permanent Related Commands clear bridge show bridge address table static show bridge address table count bridge multicast filtering The bridge multicast filtering Global Configuration mode command enables filtering multicast addresses To disable filtering multicast addresses use the no form of this command Syntax bridge multicast filtering no bridge multicast filtering Default Setting Filtering multicast addresses is disabled All multicast addresses are flooded to all ports Command Mode Global Configuration mode C
44. 4 496 20000 DIS 7 Spanning Tree Commands 4 Console show spanning tree Spanning tree enabled mode RSTP Default port cost method long Root Priority 36864 ID Address 00 02 4b 29 7a 00 This switch is the root Hello Time 2 sec Max Age 20 Forward Delay 15 sec sec Interfaces Name State Prio Nbr Cost Sts Role PortFast Type 1 el Enabled 28 1 20000 FWD Desg No P2p RSTP 1 e2 Enabled 28 2 20000 FWD Desg No Shared STP 1 e3 Disabled 28 3 20000 7 1 e4 Enabled 28 4 20000 FWD Desg No Shared STP 1 e5 Enabled 28 5 20000 DIS console show spanning tree Spanning tree disabled BPDU filtering mode RSTP Default port cost method long Root Priority N A ID Address N A Path N A Cost Root N A Port Hello Time N A Max Age N A Forward Delay N A 4 497 4 Command Line Interface 4 498 Brid Priority ge ID Address Hello Time 2 sec Interfaces Name State Prio Nbr 1 el Enabled 128 1 1 e2 Enabled 128 2 1 e3 Disabled 128 3 1 e4 Enabled 128 4 1 e5 Enabled 128 5 Hello Time 2 sec 36864 00 02 4b 29 Max Age 20 sec 20000 20000 20000 7 20000 a 20000 console show spanning tree active Spanning tree enabled mode RSTP Default port cost method long Root Priority 32768 ID Address 00 01 42 97 Path 20000 Cost Root 1 1 Port el Hello Time 2 sec Max Age 20 sec Brid Priority 36864 ge ID Address 00 02 4b 29 Max Age 20 sec 7a 00 Forward Delay
45. 4 Command Line Interface Example The following example enables public key authentication for incoming SSH sessions console config ip ssh pubkey auth Related Commands crypto key generate dsa crypto key generate rsa crypto key pubkey chain ssh user key key string show crypto key mypubkey show crypto key pubkey chain ssh crypto key pubkey chain ssh The crypto key pubkey chain ssh Global Configuration mode command enters the SSH Public Key chain Configuration mode The mode is used to manually specify other device public keys such as SSH client public keys Syntax crypto key pubkey chain ssh Default Setting No keys are specified Command Mode Global Configuration mode Command Usage There are no user guidelines for this command 4 514 SSH Commands 4 Example The following example enters the SSH Public Key chain Configuration mode and manually configures the RSA key pair for SSH public key chain bob console config crypto key pubkey chain ssh console config pubkey chain user key bob console config pubkey key key string rsa AAAAB3NzaClyc2 EAAAADAQABAAABAOCVTnRwPW1 Al4kpqIw9GBRonZQZxj HKcqKL6rM10 ZNXf ZSkvHG Qus1Z 76ILmFT34v7u7ChFAE Vu4GREpSwoQUvV3 5LqJdJk671I0U zfwOllg kTwm175QR9gHuj S6KwGN2QWXgh3ub8gDj TSq muSn Wd05iDX2IExQWu08licgl1k02LYciz Z4TYEU 9FIxwPiVQOjc KBXuROjuNg5nFYsY OZCkON W9a tnkm1shRE7Di71 w3fNiOA 6w9044t6 AINEICBCCA4YcF6zMzaTlwefWwx6f Rmt 5nhhqdAtN 4oJ
46. 40 and 41 to queue 1 Console config qos map dscp queue 33 40 41 to 1 4 425 4 Command Line Interface Related Commands show qos interface qos map policed dscp qos trust Global The qos trust Global Configuration mode command configures the system to the basic mode and trust state To return to default state trust VPT use the no form of the command Syntax qos trust cos dscp no qos trust cos Indicates that ingress packets are classified with packet CoS values Untagged packets are classified with the default port CoS value dscp Indicates that ingress packets are classified with packet DSCP values Default Setting CoS is the default trust mode Command Mode Global Configuration mode Command Usage Packets entering a quality of service QoS domain are classified at the edge of the QoS domain When packets are classified at the edge the switch port within the QoS domain can be configured to one of the trusted states because there is no need to classify the packets at every device in the domain A switch port on an inter QoS domain boundary can be configured to the DSCP trust state and if the DSCP values are different between the QoS domains the DSCP to DSCP mutation map can be applied Use this command to specify whether the port is trusted and which fields of the packet to use to classify traffic When the system is configured as trust DSCP traffic is mapped to a queue accordi
47. Access Control MAC Based ACL and click Apply MAC Based ACL Ac tame F Remove ACL r Pla Aston Soc Danan VLAN ID Mody Hamers 4 is Zaj zee Figure 3 51 MAC Based ACL Page 3 125 B Configuring the Switch CLI The following is an example of the MAC Based ACL CLI commands Console config mac access list macl acll 4 271 Console config mac al permit 6 6 6 6 6 6 0 0 0 0 0 0 any vlan 6 4 272 Console config mac acl deny 66 66 66 66 66 66 4 273 Configuring Interface Connections You can use the Interface Configuration Page page to enable disable an interface set auto negotiation and the interface capabilities to advertise or manually fix the speed duplex mode and flow control Interfaces can also be designated as PVE ports PVE ports bypass the Forwarding Database FDB and forward all Unicast Multicast and Broadcast traffic to an uplink A single uplink can be defined for a protected port Command Attributes e Unit No Indicates the stacking member for which the interface configuration information is displayed e Name Displays the port number e Port Type Displays the port type The possible field values are e Copper Indicates the port has a copper port connection e Fiber Indicates the port has a fiber optic port connection e Port Status Indicates whether the port is currently operational or non operational The possible field values are e Up Indicates the
48. Command Mode User EXEC mode Command Usage There are no user guidelines for this command Example The following example displays information about the active users console show users Username Protocol Location Bob Serial John SSH 172 16 0 1 Robert HTTP 172 16 0 8 Betty Telnet 172 16 1 7 Related Commands username show sessions show sessions The show sessions User EXEC mode command lists open Telnet sessions Syntax show sessions Default Setting There is no default configuration for this command Command Mode User EXEC mode 4 547 4 Command Line Interface Command Usage There are no user guidelines for this command Example The following example lists open Telnet sessions console gt show sessions Connection Host Address Port Byte 1 Remote device 172 16 1 1 23 89 2 172 16 1 2 1724 16 12 23 8 The following table describes significant fields shown above Field Description Connection Connection number Host Remote host to which the device is connected through a Telnet session Address IP address of the remote host Port Telnet TCP port number Byte Number of unread bytes for the user to see on the connection Related Commands show users show system The show system User EXEC mode command displays system information Syntax show system unit unif e unit Specifies the number of the unit Range 1 8 Default Setting This command h
49. Conta Password Alpha Numen Figure 3 36 Enable Passwords Page CLI The following is an example of the CLI commands used for configuring Enable Passwords Console config enable password level 15 secret 4 263 Defining Access Profiles Access profiles are profiles and rules for accessing the device Access to management functions can be limited to user groups User groups are defined for interfaces according to IP addresses or IP subnets Access profiles contain management methods for accessing and managing the device The device management methods include All e Telnet e Secure Telnet SSH e HTTP Management access to different management methods may differ between user groups For example User Group 1 can access the switch module only via an HTTPS session while User Group 2 can access the switch module via both HTTPS and Telnet sessions The Access Profiles Page contains the currently configured access profiles and their activity status 3 93 B Configuring the Switch Assigning an access profile to an interface denies access via other interfaces If an access profile is assigned to any interface the device can be accessed by all interfaces Use the Authentication Settings menu to restrict management access based on specified user names and passwords You can manually configure access rights on the switch or you can use a remote access authentication server based on RADIUS or TACACS protocols R
50. Default Setting The default privilege level is 1 Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command 4 558 User Interface Commands 4 Example The following example return to Users EXEC mode console disable console gt Related Commands enable login The login User EXEC mode command changes a login username Syntax login Default Setting This command has no default configuration Command Mode User EXEC mode Command Usage There are no user guidelines for this command Example The following example enters Privileged EXEC mode and logs in with username admin console gt login User Name admin Password Console Related Commands exit end configure The configure Privileged EXEC mode command enters the Global Configuration mode Syntax configure Default Setting This command has no default configuration Command Mode Privileged EXEC mode 4 559 4 Command Line Interface Command Usage There are no user guidelines for this command Example The following example enters Global Configuration mode console configure console config Related Commands exit Configuration exit Configuration The exit command exits any configuration mode to the next highest mode in the CLI mode hierarchy Syntax exit Default Setting This command has no default configuration Command Mode All configuration mo
51. Hungary From the last weekend of March until the last weekend of October e India India does not use Daylight Saving Time Iran From Farvardin 1 until Mehr 1 e Iraq From April 1 until October 1 Ireland From the last weekend of March until the last weekend of October e Israel Varies year to year Italy From the last weekend of March until the last weekend of October Japan Japan does not use Daylight Saving Time 3 65 B Configuring the Switch Jordan From the last weekend of March until the last weekend of October Latvia From the last weekend of March until the last weekend of October Lebanon From the last weekend of March until the last weekend of October Lithuania From the last weekend of March until the last weekend of October Luxembourg From the last weekend of March until the last weekend of October Macedonia From the last weekend of March until the last weekend of October Mexico From the first Sunday in April at 02 00 to the last Sunday in October at 02 00 Moldova From the last weekend of March until the last weekend of October Montenegro From the last weekend of March until the last weekend of October Netherlands From the last weekend of March until the last weekend of October New Zealand From the first Sunday in October until the first Sunday on or after March 15 Norway From the last w
52. IP address Interface Type 10 7 1 192 24 VLAN 1 Static 10 7 2 192 24 VLAN 2 DHCP Related Commands ip address ip address dhcp ip default gateway arp The arp Global Configuration mode command adds a permanent entry in the Address Resolution Protocol ARP cache To remove an entry from the ARP cache use the no form of this command Syntax arp jp_addr hw_adar ethernet interface number vlan vian id port channel port channel number no arp jp_addr ethernet interface number vlan vian id port channel port channel number ip_addr Valid IP address or IP alias to map to the specified MAC address e hw_addr Valid MAC address to map to the specified IP address or IP alias e interface number Valid Ethernet port e vian id Valid VLAN number e port channel number Valid port channel number Default Setting This command has no default configuration Command Mode Global Configuration mode Command Usage The software uses ARP cache entries to translate 32 bit IP addresses into 48 bit hardware addresses Because most hosts support dynamic resolution static ARP cache entries do not generally have to be specified 4 363 4 Command Line Interface Example The following example adds IP address 198 133 219 232 and MAC address 00 00 0c 40 0f bc to the ARP table Console config arp 198 133 219 232 00 00 0c 40 0f bc ethernet 1 e6 Related Commands arp timeout show arp arp timeout
53. Indicates that a short has occurred in the cable e OK Indicates that the cable passed the test Cable Fault Distance Indicates the distance from the port where the cable error occurred Last Update Indicates the last time the port was tested Cable Length Indicates the approximate cable length This test can only be performed when the port is up and operating at 1 Gbps Web Click Physical Diagnostics Copper Cable define the fields and click Test Copper Cable oie Post Test Roshi Cable Fault Distance Last Update Cable Lengthy 3 206 Defining Default Domains 3 Figure 3 99 Copper Cable Page CLI The following is an example of the CLI commands used to test copper cables Console gt show copper ports cable length 4 391 Port Length meters 1 e1 lt 50 1 e2 Copper not active 1 e3 110 140 1 gl Fiber Viewing Optical Transceivers The Optical Transceiver Page allows network managers to perform tests on Fiber Optic cables Optical transceiver diagnostics can be performed only when the link is present Command Attributes Unit No Displays the stacking member for which the cable information is displayed Port Displays the port number on which the cable is tested Temperature Displays the temperature C at which the cable is operating Voltage Displays the voltage at which the cable is operating Current Displays the current at which the cable is op
54. Number of buckets specified for the RMON collection history statistics group is 50 Number of seconds in each polling cycle is 1800 Command Mode Interface Configuration Ethernet port channel mode Command Usage Cannot be configured for a range of interfaces range context Example The following example enables a Remote Monitoring RMON MIB history statistics group on Ethernet port 1 e1 with index number 1 and a polling interval period of 2400 seconds Console config interface ethernet 1 el Console config if rmon collection history 1 interval 2400 Related Commands show rmon collection history show rmon history show rmon collection history The show rmon collection history User EXEC mode command displays the requested RMON history group statistics 4 439 4 Command Line Interface Syntax show rmon collection history ethernet interface port channel port channel number e interface Valid Ethernet port Full syntax unit port port channel number Valid port channel number Default Setting This command has no default configuration Command Mode User EXEC mode Command Usage There are no user guidelines for this command Example The following example displays all RMON history group statistics Console gt show rmon collection history Index Interface Interval Requested Granted Owner Samples Samples al 1 el 30 50 50 CLI 2 1 el 1800 50 50 Manager The following table des
55. OSPF 3 123 P PIM 3 123 PoE 3 42 Policing 3 174 Policy 3 175 port statistics 3 135 Power over Ethernet 3 42 Privacy Key 3 82 Private VLAN Edge 3 127 problems troubleshooting B 609 Protocol Independent Multicast 3 123 PVE 3 127 Q QOS 3 174 QoS 3 175 Quality of Service 3 174 Index 618 Queue 3 174 Queues 3 175 3 177 R RADIUS 3 99 Rapid Spanning Tree Protocol 3 150 RSTP 3 150 Rules 3 96 3 175 S Scheduling 3 177 Secure Shell 3 100 Security 3 175 Shaping 3 174 Simple 3 175 SNMP 3 36 3 175 SNMP management station 3 36 specifications software A 605 SSH 3 100 Stack master 3 36 3 37 Stacking discovering 3 37 Stacking failover topology 3 37 standards IEEE A 606 statistics port 3 135 STP 3 151 Strict priority 3 176 System time 3 64 T TACACS logon authentication 3 94 Telnet 3 100 Time Domain Reflectometry 3 206 Topology 3 37 Traffic shaping 3 174 troubleshooting B 609 Trust 3 175 U Unit failure 3 36 Unit IDs 3 37 Vv VLANs displaying basic information 3 159 Index VPT 3 175 3 176 Web interface access requirements 3 31 W configuration buttons 3 32 Warm standby 3 38 home page 3 31 menu list 3 33 panel display 3 33 Weighted Round Robin 3 176 WRR 3 176 3 177 Index 619 Index Index 620
56. PE 4 581 switchport switchportaccess Enables receiving multicast transmissions from a VLAN thatis not IC 4 584 multicast tv vlan the Access port VLAN while keeping the L2 segregation with subscribers on different Access port VLANs Use the no form of this command to disable receiving multicast transmissions show vlan Use the show vlan multicast TV command to display information PE 4 585 multicast tv on the source ports and receiver ports of multicast TV VLAN ip igmp snooping defines the Multicast IP addresses that are associated with a GC 4 586 multicast tv multicasttv VLAN switchport general Sets a mac based classification rule To delete a IC 4 588 map macs group vlan classification use the no form of the command 4 565 4 Command Line Interface Table 4 33 VLAN Commands Command Function Mode Page switchport general Sets a subnet based classification rule To delete a IC 4 589 map subnets group classification use the no form of the command vlan map mac Maps a MAC address or a range of MAC addresses to a group of VLAN 4 589 macs group MAC addresses Use the no form of this command to delete a map show vlan Displays macs groups information PE 4 590 macs group map subnet Maps an IP subnet or a group of IP subnets Use the no form of VLAN 4 591 subnets group this command to delete the map show vian Displays subnets groups information PE 4 591 subnets group map p
57. Statistics group use the no form of this command show rmon Displays the requested RMON history group statistics UE 4 439 collection history show rmon history Displays RMON Ethernet history statistics UE 4 441 rmon alarm Configures alarm conditions To remove an alarm use the no GC 4 443 form of this command show rmon Displays the alarms table UE 4 445 alarm table show rmon alarm Displays alarm configuration UE 4 445 rmon event Configures an event To remove an event use the no form ofthis GC 4 447 command show rmon events Displays the RMON event table UE 4 448 4 436 RMON Commands 4 Table 4 25 RMON Commands Command Function Mode Page show rmon log Displays the RMON log table UE 4 449 rmon table size Configures the maximum size of RMON tables To return to the GC 4 450 default configuration use the no form of this command show rmon statistics The show rmon statistics User EXEC mode command displays RMON Ethernet statistics Syntax show rmon statistics ethernet interface number port channel port channel number interface number Valid Ethernet port port channel number Valid port channel number Default Setting This command has no default configuration Command Mode User EXEC mode Command Usage There are no user guidelines for this command Example The following example displays RMON Ethernet statistics for Ethernet port 1 e1
58. The device cannot provide authentication services to the client through the interface dotlx Enables periodic re authentication of the client To return to the ICE 4 236 re authentication default configuration use the no form of this command dotlx timeout Sets the number of seconds between re authentication attempts ICE 4 236 re authperiod To return to the default configuration use the no form of this command dotlx Manually initiates a re authentication of all 802 1X enabled ports PE 4 237 re authenticate or the specified 802 1X enabled port dotlx timeout Sets the number of seconds that the device remains in the quiet ICE 4 238 quiet period state following a failed authentication exchange for example the client provided an invalid password To return to the default configuration use the no form of this command dot1x timeout Sets the number of seconds that the device waits for a response ICE 4 239 tx period to an Extensible Authentication Protocol EAP request identity frame from the client before resending the request To return to the default configuration use the no form of this command dotlx max req Sets the maximum number of times that the device sends an ICE 4 240 Extensible Authentication Protocol EAP request identity frame assuming that no response is received to the client before restarting the authentication process To return to the default configuration use the no form of this command dotlx timeout Sets
59. The following example sets the deadtime to 10 minutes console config radius server deadtime 10 Related Commands radius server host radius server key radius server retransmit radius server source ip radius server timeout show radius servers show radius servers The show radius servers Privileged EXEC mode command displays the RADIUS server settings Syntax show radius servers Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays RADIUS server settings console show radius servers IP Auth TimeOut Retran in DeadTime Source Prio in Usage address in CLI in CLI CLI CLI 272 1 6 1 1645 Global Global Global ul All ai 172 16 1 1645 11 8 Global Global 2 All a2 4 435 4 Command Line Interface Global values TimeOut 3 Retransmit 3 Deadtime 0 Source IP 172 16 8 1 Related Commands radius server host radius server key radius server retransmit radius server source ip radius server timeout radius server deadtime RMON Commands Table 4 25 RMON Commands Command Function Mode Page show rmon Displays RMON Ethernet statistics UE 4 437 Statistics rmon collection Enables a Remote Monitoring RMON MIB history statistics IC 4 439 history group on an interface To remove a specified RMON history
60. Transmit Packets Defines the how the packets are mirrored The possible field values are e Untagged Mirrors packets as untagged VLAN packets This is the default value Tagged Mirrors packets as tagged VLAN packets Source Port Indicates the port from which the packets are mirrored Type Indicates the port mode configuration for port mirroring The possible field values are e RX Defines the port mirroring on receiving ports e TX Defines the port mirroring on transmitting ports e RX and TX Defines the port mirroring on both receiving and transmitting ports This is the default value Status Indicates if the port is currently monitored The possible field values are e Active Indicates the port is currently monitored e Ready Indicates the port is not currently monitored Remove Removes the port mirroring session The possible field values are Checked Removes the selected port mirroring sessions e Unchecked Maintains the port mirroring session Web Click Physical Diagnostics Port Mirroring Specify the source port the traffic type to be mirrored and the destination port then click Add 3 134 Creating Trunks 3 Port Mirroring Destination Pon E Traman Packets Ureaqged a Semce Port Type States Medity Remove 1 4 Cc ey Figure 3 56 Port Mirroring Page CLI The following is an example of the Port Mirroring CLI commands Console config
61. aaa authentication dot1x default none Related Commands aaa authentication enable dot1x system auth control The dot1x system auth control Global Configuration mode command enables 802 1x globally To return to the default configuration use the no form of this command Syntax dot1x system auth control no dot1x system auth control Default Configuration 802 1x is disabled globally Command Modes Global Configuration mode Command Usage There are no user guidelines for this command Example The following example enables 802 1x globally Console config dotlx system auth control Related Commands dot1x re authenticate show dot1x dot1x port control The dot1x port control Interface Configuration mode command enables manually controlling the authorization state of the port To return to the default configuration use the no form of this command 4 234 802 1x Commands 4 Syntax dot1x port control auto force authorized force unauthorized no dot1x port control e auto Enables 802 1X authentication on the interface and causes the port to transition to the authorized or unauthorized state based on the 802 1X authentication exchange between the port and the client e force authorized Disables 802 1X authentication on the interface and causes the port to transition to the authorized state without any authentication exchange required The port resends and receives normal traffic without 802 1 X base
62. all packets are permitted After an ACE is added an implied deny any any condition exists at the end of the list and those packets that do not match the conditions defined in the permit statement are denied Example The following example shows how to define a permit statement for an IP ACL Console config ip access list ip acll Console config ip al permit rsvp 192 1 1 1 0 0 0 0 any dscp 56 Related Commands ip access list 4 268 permit IP show access lists deny IP ACL Commands 4 The deny IP Access List Configuration mode command denies traffic if the conditions defined in the deny statement match Syntax deny disable port any protocol any source source wildcara any destination destination wildcara dscp dscp number ip precedence ijp precedence deny any protocol any source source wildcara any destination destination wildcara dscp dscp number ip precedence jp precedence deny icmp any source source wildcara any destination destination wildcara any icmp type any icmp code dscp number ip precedence number deny igmp any source source wildcara any destination destination wildcara any igmp type dscp number ip precedence number disable port Specifies that the port should be disabled if the conditions defined match e source Specifies the IP address or host name from which the packet was sent Spec
63. bridge multicast address bridge multicast forward all bridge multicast forbidden forward all show bridge multicast filtering bridge multicast forward all The bridge multicast forward all Interface Configuration VLAN mode command enables forwarding all multicast packets on a port To restore the default configuration use the no form of this command Syntax bridge multicast forward all add remove ethernet interface list port channel port channel number list no bridge multicast forward all e add Force forwarding all multicast packets remove Do not force forwarding all multicast packets e interface list Separate nonconsecutive Ethernet ports with a comma and no spaces a hyphen is used to designate a range of ports port channel number list Separate nonconsecutive port channels with a comma and no spaces a hyphen is used to designate a range of port channels Default Setting This setting is disabled 4 281 4 Command Line Interface Command Mode Interface Configuration VLAN mode Command Usage There are no user guidelines for this command Example The following example configures the device to forward all multicast packets on port 1 e8 Console config interface vlan 2 Console config if bridge multicast forward all add ethernet 1 e8 Related Commands bridge multicast filtering bridge multicast address bridge multicast forbidden address bridge multicast forbidden
64. e excluded lIndicates that the view type is excluded Default Setting No view entry exists 4 453 4 Command Line Interface Command Mode Global Configuration mode Command Usage This command can be entered multiple times for the same view record The number of views is limited to 64 No check is made to determine that a MIB node corresponds to the starting portion of the OID until the first wildcard Example The following example creates a view that includes all objects in the MIB II system group except for sysServices System 7 and all objects for interface 1 in the MIB II interface group console config snmp server view user view system included console config snmp server view user view system 7 excluded console config snmp server view user view ifEntry 1 included Related Commands show snmp show snmp views snmp server group The snmp server group Global Configuration mode command configures a new Simple Management Protocol SNMP group or a table that maps SNMP users to SNMP views To remove a specified SNMP group use the no form of this command Syntax snmp server group groupname v1 v2 v3 noauth auth priv notify notifyview read readview write writeview no snmp server group groupname v1 v2 v3 noauth auth priv groupname Specifies the name of the group e vi lIndicates the SNMP Version 1 security model e v2 Indicates the SNMP Version 2 securi
65. excluding framing bits but including FCS octets and had either a bad Frame Check Sequence FCS with an integral number of octets FCS Error ora bad FCS with a non integral number of octets Alignment E rror Dropped The total number of events in which packets were dropped by the probe due to lack of resources during this sampling interval This number is notnecessarily the number of packets dropped itis just the number of times this condition has been detected Collisions The best estimate of the total number of collisions on this Ethernet segment during this sampling interval Related Commands rmon collection history show rmo n collection history rmon alarm The rmon alarm Global Configuration mode command configures alarm conditions To remove an alarm use the no form of this command Syntax rmon alarm index variable interval rthreshold fthreshold revent fevent type type startup direction owner name no rmon alarm index index Specifies the alarm index Range 1 65535 variable Specifies the object identifier of the variable to be sampled interval Specifies the interval in seconds during which the data is sampled and compared with rising and falling thresholds Range 1 4294967295 4 443 4 Command Line Interface rthreshold Specifies the rising threshold Range 0 4294967295 fthreshold Specifies the falling threshold Range 0 4294967295 revent Spe
66. ip igmp snooping leave time out show ip igmp snooping groups 4 356 IGMP Snooping Commands 4 show ip igmp snooping interface The show ip igmp snooping interface User EXEC mode command displays IGMP snooping configuration Syntax show ip igmp snooping interface vian id vian id VLAN number Default Setting This command has no default configuration Command Mode User EXEC mode Command Usage There are no user guidelines for this command Example The following example displays IGMP snooping information on VLAN 1000 Console gt show ip igmp snooping interface 1000 IGMP Snooping is globaly enabled IGMP Snooping is enabled on VLAN 1000 IGMP host timeout is 300 sec IGMP Immediate leave is disabled IGMP leave timeout is 10 sec IGMP mrouter timeout is 200 sec Automatic learning of multicast router ports is enabled Related Commands ip igmp snooping Global show ip igmp snooping mrouter ip igmp snooping mrouter time out ip igmp snooping leave time out show ip igmp snooping groups show ip igmp snooping groups The show ip igmp snooping groups User EXEC mode command displays multicast groups learned by IGMP snooping Syntax show ip igmp snooping groups vlan vian ia address jp multicast address vian id VLAN number jp multicast address P multicast address Default Setting This command has no default configuration 4 357 4 Command Line Interface Command Mode User EXEC mod
67. mst Exits the MST configuration mode and applies all configuration MST 4 492 changes abort mst Exits the MST configuration mode without applying the MST 4 493 configuration changes spanning tree guard Enables root guard on all spanning tree instances on the interface IC 4 494 root Root guard prevents the interface from becoming the root port of the device To disable root guard on the interface use the no form of this command show spanning tree Displays spanning tree configuration PE 4 495 4 471 4 Command Line Interface spanning tree The spanning tree Global Configuration mode command enables spanning tree functionality To disable spanning tree functionality use the no form of this command Syntax spanning tree no spanning tree Default Setting Spanning tree is enabled Command Modes Global Configuration mode Command Usage There are no user guidelines for this command Example The following example enables spanning tree functionality Console config spanning tree Related Commands spanning tree mode show spanning tree spanning tree mode The spanning tree mode Global Configuration mode command configures the spanning tree protocol To return to the default configuration use the no form of this command Syntax spanning tree mode stp rstp mstp no spanning tree mode e stp Indicates that the Spanning Tree Protocol STP is enabled rstp Indicates that the
68. number The field range to detect jabbers is between 20 ms and 150 ms 3 215 3 Configuring the Switch Collisions Displays the number of collisions received on the interface since the device was last refreshed Utilization Displays the percentage of the interface utilized Web Click System RMON History History Table and select an a history entry number Received adeat Uederize Oversize Pachom Pachom Pachom Enrons Porsa Pochon rresmonts Jabbers Coltelons Uatizadion Figure 3 104 RMON History Table Page CLI The following is an example of the CLI commands used to view RMON History Table statistics Console gt show rmon history 1 throughput 4 441 Sample Set 1 Owner CLI Interface 1 e1 Interval 1800 Requested samples 50 Granted samples 50 Maximum table size 500 Time Octets Packets Broadcas Multicast Util 3 216 Managing RMON Statistics 3 Jan 18 2002 303595962 357568 3289 7287 19 21 57 00 Jan 18 2002 287696304 275686 2789 5878 20 21 57 30 Console gt show rmon history 1 errors 4 441 Sample Set 1 Interface 1 el Requested samples 50 Maximum table size 500 Owner Me Interval 1800 Granted samples 50 800 after reset Time CRC Align Undersize Oversize Fragments Jabbers Jan 18 2002 1 L 0 49 0 21 57 00 Jan 18 2002 1 L 0 27 0 21 57 30 Console gt show rmon history 1 other 4 441 Sample Set 1 Interface 1 el Requested samples 50 Ma
69. power inline usage threshold show power inline power inline priority The power inline priority Interface Configuration Ethernet mode command configures the inline power management priority of the interface To return to the default configuration use the no form of this command Syntax power inline priority critical high low no power inline priority e critical Indicates that operating the powered device is critical e high Indicates that operating the powered device has high priority e low Indicates that operating the powered device has low priority Default Setting The Default Settingis low priority 4 400 Power over Ethernet Commands 4 Command Mode Interface Configuration Ethernet mode Command Usage There are no user guidelines for this command Example The following example configures the device connected to Ethernet interface 1 e1 as a high priority powered device Console config interface ethernet 1 el Console config if power inline priority high Related Commands power inline power inline powered device power inline usage threshold show power inline power inline usage threshold The power inline usage threshold Global Configuration mode command configures the threshold for initiating inline power usage alarms To return to the default configuration use the no form of this command Syntax power inline usage threshold percentage no power inline usage threshold per
70. seconds e Termination Cause Indicates the reason for which the port authentication was terminated Web Click Security 802 1x Port Authentication define the fields and click Apply Port Authentication Unit he fa Copy bom Entry Member to Row Number s peered Carel repos clad agenes Sat Terminate 14 ayy Tissot Conse s Pon We Current Pettedic Resetbentication Kame Pert Conmol Reauhenticaten Period Peed EAP Regem Tim 1 tet Enatie 2 Wet Enatie Figure 3 45 Port Authentication Page WebView CLI The following is an example of the Port Authentication CLI commands Console dot1lx re authenticate ethernet 1 e16 Console config interface ethernet 1 e16 Console config if dotlx port control auto config if dotlx re authentication dotlx timeout re authperiod 300 dotlx timeout quiet period 3600 dotix timeout tx period 3600 dot1lx max req 6 Conso Conso config if Conso config if Le Le Le Console config if Le Le Le Conso config if Conso config if dot1x timeout supp timeout 3600 Conso config if dotlx timeout server timeout 3600 4 237 4 323 4 234 4 236 4 236 4 238 4 239 4 240 4 241 4 242 Configuring Multiple Hosts The Multiple Hosts Page allows network managers to configure advanced port based authentication settings for specific ports and VLANs 3 113 B Configuring the Switch Command Attributes Por
71. 31 Managing Device Information ceeesseeeeeeeeeeneeeeenneetenneeeeeneeeseneeeesnaeeeenaeees 3 34 Configuring Stacking ececceceeeeeeeeeeeeeeeeeeseeeeeaeeeeeeseaeeseeseeeeeeeseaeeeeeseeeeeeeeeaes 3 39 Resetting the Stack sssrinin re sea a akes i iraia aa 3 40 Managing Power over Ethernet Devices eee eeeeeceeeeeeeeeeneeteeneeeteneeeeenneeeees 3 42 Defining PoE Interfaces ccececceceeeeeeseeeeeteneeeseeeeeseeeeeesnseenseneeeeeeeenseneenes 3 44 Configuring IP Information ecceecceeeceeeeeeeeeeeeeeeeeeeeaeeeaeeeaeseaeeseesnaeeseeseaeeenees 3 46 Defining Default Gateways ceeceeeeeeeceeneeeeeeeeeeeeseeseeeceaeeceaeeeaeesaeeeeeteeeeeaees 3 47 Configuring DHCP ou eeeececeeeseeeeeeseeeeeseeeeeseaeeeeeessaeeeaeeseaeeeaeeseeseaeeeneeeeeenaees 3 48 Gontiguring ARP sisiveiccc atisescdaeeiinal aia R O R aaa 3 49 Managing System Files eccceeceseseeeeeeeeeeeeeeeeeeeeeeeeaeseeeeeaeseaeeeeeeeeaeesieeeeeeraees 3 51 Downloading System Files isisisi 3 51 Copying FIlGS zest asighceegs ceiaetis ties tae nee siriana anoaiiaeaii oraka riisi is 3 55 Configuring System TIME sirisser roa ia a Ea 3 64 Configuring SNTP Configuring SNMP Configuring User Authentication ceeceeceeeceeeeeeeeeeeeeeeeeeeeeeseeeeeeeseeeeeeeeaees 3 90 Defining Access Profiles cccsccceesereeeeeeeeeneneeeneneeeeeeeeeenaeeeseeeeeseeeeneneeeenees 3 93 Port Based Authentication ce eeceeeeseeeeeeeeeeeneeeeenneese
72. 4 223 Entering Commands 0 ccceeeceeeeeeeeeeeeeeseeeeeaeeeeeeeeneeseeeeeaeesiaeseaeeeneeseaeeeeeeeaes 4 225 Command Groups cia fcc sccepescedsecccatedsctestccesenetansetcasasstsubtunes endeesadeapecaagusansadiaes 4 230 802 1X COMMANGS cisscdes sisdevecpcesises eiaa a aaa aia Eea E E aa EE EEEE EREET 4 231 AAA Commands sisri aaae R Ea EE EE AREER E 4 255 ACL Commands cccccceccceseecceeesceeseeeeeeaeeeceneeeesaeeescaeeessaaeesenseesseeeessnseeteaes 4 265 Address Table Gommannds sie scese seccuscecseseivedssoceaesed anra is arinean saire 4 276 AMAP Configuration cccceceeseeeeneeeeeeeeneeeeeseeeeeeeseeeeeaeeseaeeeaeeeseeeeeeseeetenees 4 295 Clock Commands erca ree ere e eee e EE ER ER ERTER R aa aaa 4 298 Configuration and Image File Commands s sseeseeseeeeeeeeeseeeneeeeeeneenrernsneeene 4 315 Ethernet Configuration Commands ecceeceeeeeeeeseeeeeneeeeeeeeeeeeaeeteeeeeeeeeaees 4 322 GVRP Commands cccccccsceeeseeeeeneeeeeeneceeneeeeseneeeseaeeesnaeescneeeseneessneeessaeees 4 343 IGMP Snooping Commands ceeeeeceeeteeeeeeeeeeeteeeeeeeeeneeeeaeeeaeeseaeeteeeeeeenaeee 4 351 IP Addressing Commands eccecceeeceeececeeeeeeeeeeeeteaeeeeeeeeaeeeeeseaeeeaeeseaeeeaeete 4 359 LAGP Commands i eicie lt 3e ccetehensectcdivsdeesece Mani ate eee eee 4 371 Line COMMANAS CaA A E EA A 4 377 Management ACL Commands c cecceeecceeeeeeeeteneeeneeseeeteeeseeeeeaeesieeeneeeeaeees 4 384 PHY Diagnostics COMMANAS sire
73. 4 417 aggregate policer police aggregate Applies an aggregate policer to multiple classes within the same PCC 4 417 policy map To remove an existing aggregate policer from a policy map use the no form of this command wrr queue cos map Maps Class of Service CoS values to a specific egress queue GC 4 418 To return to the default configuration use the no form of this command priority queue out Configures the number of expedite queues To return to the GC 4 419 num of queues default configuration use the no form of this command traffic shape Configures the shaper of the egress port queue To disable the IC 4 420 shaper use the no form of this command 4 405 4 Command Line Interface Table 4 23 QoS Commands Command Function Mode Page show qos interface Displays Quality of Service QoS information on the interface UE 4 421 Command Usage Assigns queue thresholds globally To return to the default GC 4 422 configuration use the no form of this command qos map dscp dp Use the qos map dscp dp Global Configuration mode GC 4 423 command to map DSCP to Drop Precedence To return to the default setting use the no form of this command qos map Modifies the policed DS CP map for remarking purposes To return GC 4 424 policed dscp to the default map use the no form of this command qos map Modifies the DSCP to CoS map To return to the default map use GC 4 425
74. 429 4 Command Line Interface Table 4 24 Radius Commands Command Function Mode Page radius server Improves RADIUS response time when servers are unavailable GC 4 434 deadtime The command is used to cause the unavailable servers to be skipped To return to the default configuration use the no form of this command show Displays the RADIUS server settings PE 4 435 radius servers radius server host The radius server host Global Configuration mode command specifies a RADIUS server host To delete the specified RADIUS host use the no form of this command Syntax radius server host p address hostname auth port auth port number timeout timeout retransmit retries deadtime deadtime key key string source source priority priority no radius server host p address hostname ip address IP address of the RADIUS server host hostname Hostname of the RADIUS server host Range 1 158 characters auth port number Port number for authentication requests The host is not used for authentication if the port number is set to 0 Range 0 65535 timeout Specifies the timeout value in seconds Range 1 30 retries Specifies the retransmit value Range 1 10 deaatime Length of time in minutes during which a RADIUS server is skipped over by transaction requests Range 0 2000 key string Specifies the authentication and encryption key for all RADIUS communications betw
75. CLI The following is an example of the device Authentication CLI commands Console config dot1x system auth control 4 234 Console config aaa authentication dot1x default none 4 233 3 111 3 Configuring the Switch Defining Port Authentication The Port Authentication Page allows network managers to configure port based authentication parameters Command Attributes Copy from Entry Number Copies port authentication information from the selected port to Row Number s Copies port authentication information to the selected port Port Displays a list of interfaces on which port based authentication is enabled User Name Displays the supplicant user name Admin Port Control Displays the current port authorization state The possible field values are e Auto Enables port based authentication on the device The interface moves between an authorized or unauthorized state based on the authentication exchange between the device and the client e Authorized Indicates the interface is in an authorized state without being authenticated The interface re sends and receives normal traffic without client port based authentication e Unauthorized Denies the selected interface system access by moving the interface into unauthorized state The device cannot provide authentication services to the client through the interface Current Port Control Displays the current port authorization state
76. CLI commands Console configure Console config port storm control include multicast 4 340 Console config interface ethernet 2 e3 4 323 Console config if port storm control include multicast 4 340 Console config if port storm control broadcast enable 4 341 Console config if port storm control broadcast rate 900 4 342 Configuring Port Mirroring Port mirroring monitors and mirrors network traffic by forwarding copies of incoming and outgoing packets from one port to a monitoring port Port mirroring can be used as a diagnostic tool as well as a debugging feature Port mirroring also enables switch performance monitoring You can mirror traffic from any source port to a target port for real time analysis You can then attach a logic analyzer or RMON probe to the target port and study the traffic crossing the source port in a completely unobtrusive manner When configuring port mirroring ensure the following e Monitor port speed should match or exceed source port speed otherwise traffic may be dropped from the monitor port All mirror sessions have to share the same destination port e When mirroring port traffic the target port must be included in the same VLAN as the source port 3 133 B Configuring the Switch The Port Mirroring Page contains parameters for monitoring and mirroring of network traffic Command Attributes Destination Port Defines the port number to which port traffic is copied
77. Commands mac access list permit MAC show access lists service acl The service acl Interface Configuration mode command applies an ACL to the input interface To detach an ACL from an input interface use the no form of this command Syntax service acl input acl name no service acl input acl name Specifies the ACL to be applied to the input interface Default Setting This command has no default configuration Command Mode Interface Ethernet port channel Configuration mode Example The following example binds services an ACL to VLAN 2 Console config interface vlan 2 Console config if service acl input macl Related Commands show interfaces access lists show access lists The show access lists Privileged EXEC mode command displays access control lists ACLs defined on the device Syntax show access lists name name Name of the ACL 4 274 ACL Commands 4 Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays access lists on a device Console show access lists IP access list ACL1 permit ip host 172 30 40 1 any permit rsvp host 172 30 8 8 any Related Commands ip access list permit IP deny IP mac access list permit MAC deny MAC show interfaces access lists The show interfaces access list
78. Configuration Page Multicast Forward All Page Multicast Group Page IGMP Snooping Mapping Page Multicast TV Membership Page DNS Server Page Default Domain Name Page DNS Host Mapping Page Copper Cable Page Optical Transceiver Page Health Page RMON Statistics Page RMON History Control Page RMON History Table Page RMON Events Control Page RMON Events Logs Page RMON Alarm Page Figures 3 189 3 190 3 191 3 193 3 195 3 197 3 198 3 199 3 202 3 203 3 204 3 207 3 208 3 210 3 212 3 214 3 216 3 218 3 220 3 222 xi Figures xii Chapter 1 Introduction This switch provides a broad range of features for switching It includes a management agent that allows you to configure the features listed in this manual The default configuration can be used for most of the features provided by this switch However there are many options that you should configure to maximize the switch s performance for your particular network environment Key Features Table 1 1 Key Features Feature Description Configuration Backup and Restore Backup to TFTP server Authentication Console Telnet web User name password RADIUS TACACS Web HTTPS Telnet SSH SNMP v1 2c Community strings SNMP version 3 MD5 or SHA password Port IEEE 802 1x Access Control Lists Supports up to 1K IP or MAC ACLs DHCP Client Supported DNS Server Supported Port Configuration Spee
79. DiffServ Code Point None In addition a single MAC based or IP based ACL can be attached directly to the interface see Configuring Network Security for more information Only packets that have a Forward action are assigned to the output queue based on the specified classification By properly configuring the output queues the following basic mode services can be set e Minimum Delay The queue is assigned to a strict priority policy and traffic is assigned to the highest priority queue e Best Effort Traffic is assigned to the lowest priority queue e Bandwidth Assignments Bandwidths are assigned by configuring the WRR scheduling scheme and choosing the right weights Advanced QoS Mode Advanced QoS mode provides rules for specifying flow classification and assigning rule actions that relate to bandwidth management Cin advanced QoS mode ACLs can be applied directly to an interface However a policy and ACL cannot be simultaneously applied to an interface After assigning packets to a specific queue services such as configuring output queues for the scheduling scheme or configuring output shaping for burst size CIR or CBS per interface or per queue can be applied In Advanced Mode packets may egress with a different VPT tag than expected Enabling QoS The QoS Port Priority Page contains fields for enabling or disabling QoS In 3 177 B Configuring the Switch addition the Trust mode can be selected The
80. Disabled 1000M 7 Figure 3 64 STP Interface Page CLI The following is an example of the STP interface commands Console config interface ethernet 1 e5 4 323 Console config if spanning tree disable 4 476 Console config if spanning tree cost 35000 4 477 Console config if spanning tree port priority 96 4 478 Console config if spanning tree portfast 4 479 Defining Rapid Spanning Tree While Classic STP prevents Layer 2 forwarding loops in a general network topology convergence can take between 30 60 seconds This time may delay detecting possible loops and propagating status topology changes Rapid Spanning Tree Protocol RSTP detects and uses network topologies that allow a faster STP convergence without creating forwarding loops The Global System LAG information displays the same field information as the ports but represent the LAG RSTP information The Rapid Spanning Tree Page contains parameters for defining RSTP Command Attributes Unit No Indicates the stacking member for which the STP interface parameters are displayed e Interface Displays the port or LAG on which Rapid STP is enabled e Role Displays the port role assigned by the STP algorithm to provide to STP paths The possible field values are e Root Provides the lowest cost path to forward packets to the root switch 3 150 Defining Spanning Tree 3 e Designated The port or LAG through which the designated switch i
81. Dropped severity Buffer logging level debugging Buffer Messages 11 Logged 200 Max File logging level notifications File Messages 0 Dropped severity Syslog server 192 180 2 27 logging errors Messages 6 Dropped severity Syslog server 192 180 2 28 logging errors Messages 6 Dropped severity 2 messages were not logged resources Application filtering control Application Event Status AAA Login Enabled File system Copy Enabled File system Delete Rename Enabled Management Deny Enabled ACL Buffer log 11 Aug 2004 15 41 43 LINK 3 UPDOWN Interface FastEthernet0 0 changed state to up 11 Aug 2004 15 41 43 SLINK 3 UPDOWN Interface Ethernet1 0 changed state to up 11 Aug 2004 15 41 43 SLINK 3 UPDOWN Interface Ethernet1 1 changed state to up Aug 2004 15 41 43 LINK 3 UPDOWN Interface Ethernet1 2 changed state o 5 o up 1 11 Aug 2004 15 41 43 SLINK 3 UPDOWN Interface Ethernet1 3 changed state t 11 Aug 2004 15 41 43 SYS 5 CONFIG_I Configured from memory by console 11 Aug 2004 15 41 39 LINEPROTO 5 UPDOWN Line protocol on Interface FastEthernet0 0 changed state to up 11 Aug 2004 15 41 39 LINEPROTO 5 UPDOWN Line protocol on Interface Ethernet1 0 changed state to down 11 Aug 2004 15 41 39 LINEPROTO 5 UPDOWN Line protocol on Interface Ethernet1 1 changed state to down 11 Aug 2004 15 41 39 LINEPROTO 5 UPDOWN Line protocol on Interface Ethernet1 2 changed state to down 11 A
82. Enable Periodic Reauthentication Permits immediate port reauthentication The possible field values are e Enable Enables immediate port reauthentication This is the default value e Disable Disables port reauthentication Reauthentication Period Displays the time span in seconds in which the selected port is reauthenticated The field default is 3600 seconds Reauthenticate Now Reauthenticates the selected ports immediately Select All selects all ports for reauthentication Authenticator State Displays the current authenticator state Quiet Period Displays the number of seconds that the device remains in the quiet state following a failed authentication exchange The possible field range is 0 65535 The field default is 60 seconds Resending EAP Defines the amount of time in seconds that lapses before EAP requests are resent The field default is 30 seconds Max EAP Requests Displays the total amount of EAP requests sent If a response is not received after the defined period the authentication process is restarted The field default is 2 retries Supplicant Timeout Displays the amount of time in seconds that lapses before EAP requests are resent to the supplicant The field default is 30 seconds 3 112 Port Based Authentication 3 Server Timeout Displays the amount of time in seconds that lapses before the device re sends a request to the authentication server The field default is 30
83. Example The following example configures the following alarm conditions Alarm index 1000 Variable identifier Alcatel Sample interval 360000 seconds Rising threshold 1000000 Falling threshold 1000000 Rising threshold event index 10 Falling threshold event index 20 Console config rmon alarm 1000 Alcatel 360000 1000000 1000000 10 20 4 444 RMON Commands 4 Related Commands show rmon alarm table show rmon alarm show rmon alarm table The show rmon alarm table User EXEC mode command displays the alarms table Syntax show rmon alarm table Default Setting This command has no default configuration Command Mode User EXEC mode Command Usage There are no user guidelines for this command Example The following example displays the alarms table Console gt show rmon alarm table Index OID Owner 1 366 2152 02 60 1061 CLI 2 12356 1 21 252 L lt 40 1 Manager 3 1 3 6 2 520 22 1104 9 CLI The following table describes significant fields shown above Field Description Index An index that uniquely identifies the entry OID Monitored variable OID Owner The entity that configured this entry Related Commands rmon alarm show rmon alarm show rmon alarm The show rmon alarm User EXEC mode command displays alarm configuration 4 445 4 Command Line Interface Syntax show rmon alarm number number Specifies the alarm index
84. General Routing Encapsulation gre 47 Encapsulating Security Payload 50 esp 50 Authentication Header ah 51 ICMP for IPv6 ipv6 icmp 58 EIGRP routing protocol eigrp 88 Open Shortest P ath Protocol ospf 89 Protocol Independent Multicast pim 103 Layer Two Tunneling Protocol 2tp 115 ISIS over IPv4 isis 124 any IP protocol any 25504 e dscp Indicates matching the dscp number with the packet dscp value ip precedence Indicates matching ip precedence with the packet ip precedence value Default Setting This command has no default configuration Command Mode IP Access List Configuration mode Command Usage Use the ip access list Global Configuration mode command to enable the IP Access List Configuration mode 4 270 ACL Commands 4 Before an Access Control Element ACE is added to an ACL all packets are permitted After an ACE is added an implied deny any any condition exists at the end of the list and those packets that do not match the defined conditions are denied Example The following example shows how to define a permit statement for an IP ACL Console config ip access list ip acll Console config ip al deny rsvp 192 1 1 1 0 0 0 255 any Related Commands ip access list permit IP show access lists mac access list The mac access list Global Configuration mode command enables the MAC Access List Configuration mode and creates Layer 2 ACLs To delete an ACL use the no
85. Interface Command Modes Interface Configuration Ethernet port channel mode Command Usage This feature should be used only with interfaces connected to end stations Otherwise an accidental topology loop could cause a data packet loop and disrupt device and network operations An interface with PortFast mode enabled is moved directly to the spanning tree forwarding state when linkup occurs without waiting the standard forward time delay Example The following example enables PortFast on Ethernet port 1 e15 console config interface ethernet 1 e15 console config if spanning tree portfast Related Commands spanning tree forward time spanning tree hello time spanning tree max age spanning tree priority spanning tree disable spanning tree cost spanning tree port priority spanning tree link type show spanning tree spanning tree link type The spanning tree link type Interface Configuration mode command overrides the default link type setting determined by the duplex mode of the port and enables Rapid Spanning Tree Protocol RSTP transitions to the forwarding state To return to the default configuration use the no form of this command Syntax spanning tree link type point to point shared no spanning tree link type point to point Indicates that the port link type is point to point shared Indicates that the port link type is shared 4 480 Spanning Tree Commands 4 Default Se
86. Interface configuration Ethernet port channel mode Command Usage The following relationship must be maintained between the timers e Leave time must be greater than or equal to three times the join time e Leave all time must be greater than the leave time Set the same GARP timer values on all Layer 2 connected devices If the GARP timers are set differently on Layer 2 connected devices the GARP application will not operate successfully Example The following example sets the leave timer for Ethernet port 1 e6 to 900 milliseconds Console config interface ethernet 1 e6 Console config if garp timer leave 900 Related Commands gvrp enable Interface gvrp vian creation forbid gvrp registration forbid show gvrp configuration gvrp vian creation forbid The gvrp vian creation forbid Interface Configuration Ethernet port channel mode command disables dynamic VLAN creation or modification To enable dynamic VLAN creation or modification use the no form of this command Syntax gvrp vian creation forbid no gvrp vian creation forbid 4 346 GVRP Commands 4 Default Setting Dynamic VLAN creation or modification is enabled Command Mode Interface Configuration Ethernet port channel mode Command Usage This command forbids dynamic VLAN creation from the interface The creation or modification of dynamic VLAN registration entries as a result of the GVRP exchanges on an interface are restricted o
87. Map Class Configuration PMC Policy Map Configuration SPK SSH Public Key string 802 1x Commands Table 4 5 802 1x Commands Command Function Mode Page aaa authentication Specifies one or more authentication authorization and GC 4 233 dotlx accounting AAA methods for use on interfaces running IEEE 802 1X To return to the default configuration use the no form of this command dotlx Enables 802 1x globally To return to the default configuration use GC 4 234 system auth control the no form of this command 4 231 4 Command Line Interface Table 4 5 802 1x Commands access to the VLAN use the no form of this command Command Function Mode Page dotlx port control Auto Enables 802 1X authentication on the interface and causes ICE 4 234 the portto transition to the authorized or unauthorized state based on the 802 1X authentication exchange between the port and the client Force authorized Disables 802 1X authentication on the interface and causes the port to transition to the authorized state without any authentication exchange required The port resends and receives normal traffic without 802 1X based authentication of the client Force unauthorized Denies all access through this interface by forcing the portto transition to the unauthorized state and ignoring all attempts by the client to authenticate
88. NAE e 6 Enable logging Set the error messages reported to include all categories Designate the SNMP host that is to receive the error messages Repeat the sequence of commands or other actions that lead up to the error Make a list of the commands or circumstances that led to the fault Also make a list of any error messages displayed Contact your distributor s service engineer For example Console config logging on Console config logging file debugging Console config snmp server host 192 168 1 23 610 Glossary Access Control List ACL ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for certain IP or MAC i e Layer 2 information Boot Protocol BOOTP BOOTP is used to provide bootup information for network devices including IP address information the address of the TFTP server that contains the devices system files and the name of the boot file Class of Service CoS CoS is supported by prioritizing packets based on the required level of service and then placing them in the appropriate output queue Data is transmitted from the queues using weighted round robin service to enforce priority service and prevent blockage of lower level queues Priority may be set according to the port default the packet s priority bit in the VLAN tag TCP UDP port number IP Precedence bit or DSCP priority bit Differentiated Services Code
89. Point Service DSCP DSCP uses a six bit tag to provide for up to 64 different forwarding behaviors Based on network policies different kinds of traffic can be marked for different kinds of forwarding The DSCP bits are mapped to the Class of Service categories and then into the output queues Domain Name Service DNS A system used for translating host names for network nodes into IP addresses Dynamic Host Control Protocol DHCP Provides a framework for passing configuration information to hosts on a TCP IP network DHCP is based on the Bootstrap Protocol BOOTP adding the capability of automatic allocation of reusable network addresses and additional configuration options Extensible Authentication Protocol over LAN EAPOL EAPOL is a client authentication protocol used by this switch to verify the network access rights for any device that is plugged into the switch A user name and password is requested by the switch and then passed to an authentication server e g RADIUS for verification EAPOL is implemented as part of the IEEE 802 1x Port Authentication standard Glossary 611 Glossary GARP VLAN Registration Protocol GVRP Defines a way for switches to exchange VLAN information in order to register necessary VLAN members on ports along the Spanning Tree so that VLANs defined in each switch can work automatically over a Spanning Tree network Generic Attribute Registration Protocol GARP GARP is a protocol that
90. Range 1 65535 Default Setting This command has no default configuration Command Mode User EXEC mode Command Usage There are no user guidelines for this command Example The following example displays RMON 1 alarms Alarm 1 Interval Sample Type Startup Alarm rising Rising Threshold 8700000 Falling Threshold 78 Rising Event Falling Event 1 Owner CLI Console gt show rmon alarm 1 OLD O E T 220626251510 Last sample Value 878128 delta 1 The following table describes the significant fields shown in the display Field Description Alarm Alarm index OID Monitored variable OID Last Sample The statistic value during the last sampling period For example if the sample type Value is delta this value is the difference between the samples at the beginning and end ofthe period If the sample type is absolute this value is the sampled value atthe end of the period Interval The interval in seconds over which the data is sampled and compared with the rising and falling thresholds Sample Type The method of sampling the variable and calculating the value compared against the thresholds If the value is absolute the value of the variable is compared directly with the thresholds atthe end of the sampling interval If the value is delta the value of the variable atthe last sample is subtracted from the current value and the difference compared with the thresholds
91. Related Commands qos aggregate policer show qos aggregate policer police aggregate service policy The service policy Interface Configuration Ethernet port Channel mode command applies a policy map to the input of a particular interface To detach a policy map from an interface use the no form of this command Syntax service policy input policy map name no service policy input policy map name Specifies the name of the policy map to be applied to the input interface Default Setting This command has no default configuration Command Mode Interface Configuration Ethernet port Channel mode Command Usage Only one policy map per interface per direction is supported Example The following example attaches a policy map called policy1 to the input interface Console config if service policy input policyl Related Commands policy map show policy map 4 415 4 Command Line Interface qos aggregate policer The qos aggregate policer Global Configuration mode command defines the policer parameters that can be applied to multiple traffic classes within the same policy map To remove an existing aggregate policer use the no form of this command Syntax qos aggregate policer aggregate policer name committed rate bps excess burst byte exceed action drop policed dscp transmit dscp dscp no qos aggregate policer aggregate policer name Specifies the name of the aggregate policer
92. Role PortFast Type el Enabled 28 1 20000 FWD Root No P2p Bound RSTP e2 Enabled 28 2 20000 FWD Desg No Shared Bound STP e3 Enabled 28 3 20000 FWD Desg No P2p e4 Enabled 28 4 20000 FWD Desg No P2p MST 1 Vlans Mapped 10 20 CST Root ID Priority 24576 Address 00 02 4b 29 89 76 Path 20000 Cost Root 4 1 Port e4 Rem hops 19 Bridge ID Priority 32768 4 503 4 Command Line Interface 4 504 Interfaces Name State 1 el Enabled 1 e2 Enabled 1 e3 Enabled 1 e4 Enabled CST Root ID IST Master ID Address 00 02 4b 29 7a 00 Prio Nbr Cost Sts Role 128 1 20000 FWD Boun 128 2 20000 FWD Boun 128 3 20000 BLK Altn 128 4 20000 FWD Desg console show spanning tree detail Spanning tree enabled mode MSTP Default port cost method long H MST 0 Vlans Mapped 1 9 21 4094 Priority 32768 Address 00 01 42 97 e0 00 Path 20000 Cost Root 1 Lf Port el Hello Time 2 sec Max Age 20 sec Priority 32768 Address 00 02 4b 29 7a 00 This switch is the IST master Hello Time 2 sec Max Age 20 sec Max hops 20 PortFast No No No P2p Bound RSTP Shared Bound STP P2p P2p Forward Delay 15 sec Forward Delay 15 sec Number of topology changes 2 last change occurred 2d18h ago Spanning Tree Commands 4 Times hold 1 topology change 35 notification 2 hello 2 max age 20 forward delay 15 Port 1 1 el enabled State Forwarding Role Root Port
93. SNTP Indicates that the system time is set via an SNTP server 3 66 Configuring System Time 3 e Date The system date The field format is Day Month Year For example 04 May 50 May 4 2050 e Local Time The system time The field format is HH MM SS For example 21 15 03 Time Zone Offset The difference between Greenwich Mean Time GMT and local time For example the Time Zone Offset for Paris is GMT 1 while the Time Zone Offset for New York is GMT 5 Daylight Savings Enables automatic Daylight Savings Time DST on the device based on the device s location There are two types of daylight settings either by a specific date in a particular year or a recurring setting irrespective of the year For a specific setting in a particular year complete the Daylight Savings area and for a recurring setting complete the Recurring area The possible field values are e USA Enables switching to DST at 2 00 a m on the first Sunday of April and reverts to standard time at 2 00 a m on the last Sunday of October e European Enables switching to DST at 1 00 am on the last Sunday in March and reverts to standard time at 1 00 am on the last Sunday in October The European option applies to EU members and other European countries using the EU standard e Other Indicates the DST definitions are user defined based on the device locality If Other is selected the From and To fields must be defined Time
94. SPK 4 515 remove an SSH public key use the no form of this command key string Manually specifies an SSH public key SPK 4 516 show ip ssh Displays the SSH server configuration PE 4 517 show crypto key Displays the SSH public keys on the device PE 4 518 mypubkey show crypto key Displays SSH public keys stored on the device PE 4 519 pubkey chain ssh ip ssh port The ip ssh port Global Configuration mode command specifies the port to be used by the SSH server To return to the default configuration use the no form of this command Syntax ip ssh port port number no ip ssh port port number Port number for use by the SSH server Range 1 65535 Default Setting The default port number is 22 Command Mode Global Configuration mode 4 510 SSH Commands 4 Command Usage There are no user guidelines for this command Example The following example specifies the port to be used by the SSH server as 8080 console config ip ssh port 8080 Related Commands ip ssh server show ip ssh ip ssh server The ip ssh server Global Configuration mode command enables the device to be configured from a SSH server To disable this function use the no form of this command Syntax ip ssh server no ip ssh server Default Setting Device configuration from a SSH server is enabled Command Mode Global Configuration mode Command Usage If encryption keys are not generated the SSH server is in stan
95. Set Offset 1 1440 Used for non USA and European countries to set the amount of time for DST in minutes The default time is 60 minutes e From Indicates the time that DST begins in countries other than the USA and Europe in the format Day Month Year in one field and HH MM in another For example if DST begins on October 25 2007 at 5 00 am the two fields should be set to 25 Oct 07 and 05 00 The possible field values are Date The date on which DST begins The possible field range is 1 31 Month The month of the year in which DST begins The possible field range is Jan Dec e Year The year in which the configured DST begins e Time The time at which DST begins The field format is HH MM For example 05 30 To Indicates the time that DST ends in countries other than the USA and Europe in the format Day Month Year in one field and HH MM in another For example if DST ends on March 23 2008 at midnight the two fields should be 23 Mar 08 and 00 00 The possible field values are Date The date on which DST ends The possible field range is 1 31 Month The month of the year in which DST ends The possible field range is Jan Dec e Year The year in which the configured DST ends Time The time at which DST starts The field format is HH MM For example 05 30 3 67 B Configuring the Switch Recurring Enables user defined DST for countries in which DST is constant from year
96. The RADIUS Page contains parameters for defining RADIUS servers Command Attributes Retries Defines the number of transmitted requests sent to the RADIUS server before a failure occurs Possible field values are 1 10 Timeout for Reply Defines the amount of time in seconds the device waits for an answer from the RADIUS server before retrying the query or switching to the next server Possible field values are 1 30 Dead Time Defines the default amount of time in minutes that a RADIUS server is bypassed for service requests The range is 0 2000 Key String Defines the default key string used for authenticating and encrypting all RADIUS communications between the device and the RADIUS server This key must match the RADIUS encryption Source IP Address Defines the default IP address of a device accessing the RADIUS server IP Address Lists the RADIUS server IP addresses Priority Displays the RADIUS server priority The possible values are 1 65535 where 1 is the highest value The RADIUS server priority is used to configure the server query order Authentication Port Identifies the authentication port The authentication port is used to verify the RADIUS server authentication The authenticated port default is 1812 Number of Retries Defines the number of transmitted requests sent to the RADIUS server before a failure occurs The possible field values are 1 10 Three is the default value Timeout f
97. The arp timeout Global Configuration mode command configures how long an entry remains in the ARP cache To return to the default configuration use the no form of this command Syntax arp timeout seconds no arp timeout seconds Time in seconds that an entry remains in the ARP cache Range 1 40000000 Default Setting The default timeout is 60000 seconds Command Mode Global Configuration mode Command Usage It is recommended not to set the timeout value to less than 3600 Example The following example configures the ARP timeout to 12000 seconds Console config arp timeout 12000 Related Commands arp show arp clear arp cache The clear arp cache Privileged EXEC mode command deletes all dynamic entries from the ARP cache Syntax clear arp cache 4 364 IP Addressing Commands 4 Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example deletes all dynamic entries from the ARP cache Console clear arp cache Related Commands arp arp timeout show arp show arp The show arp Privileged EXEC mode command displays entries in the ARP table Syntax show arp Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example di
98. This is referred to as the default engine ID If the local engine ID is deleted or changed all SNMP users will be cleared You will need to reconfigure all existing users A new engine ID can be specified by entering 1 to 26 hexadecimal characters If less than 26 characters are specified trailing zeroes are added to the value For example the value 1234 is equivalent to 1234 followed by 22 zeroes SNMP is enabled by default Command Attributes Local Engine ID 0 32 Characters Displays the local device Engine ID The field value is a hexadecimal string Each byte in hexadecimal character strings is two hexadecimal digits Each byte can be separated by a period or a colon The Engine ID must be defined before SNMPv3 is enabled Select a default Engine ID that is comprised of an Enterprise number and the default MAC address Use Default Uses the device generated Engine ID The default Engine ID is based on the device MAC address and is defined per standard as e First 4 octets first bit 1 the rest is IANA Enterprise number 3 77 B Configuring the Switch Fifth octet Set to 3 to indicate the MAC address that follows e Last 6 octets MAC address of the device Web Click SNMP Engine ID Define the fields and click Apply Figure 3 26 SNMP Security Global Parameters Page CLI The following example enables SNMPVv3 on the switch Console config snmp server engineID local defaul
99. When unselected the device maintains the current Configuration file 3 55 B Configuring the Switch Web System Mgmt File Management Define the fields Click Apply WebView Fao Nanagnees F Coertond Faa Copy Files C Copy Master Firmware E Soms Eme Drstnmien Eade C Copy Configuration Some mag Contgueton E Destnaticn Strep Contgueton a C Restore Configuration Factory Detautes ev Figure 3 16 Copy Files Page CLI The following is an example of downloading system files using CLI commands Console copy running config startup config 4 315 PEEEPP Per here errr rererr rrr ererper rere a e ep E EE EEPL PP ere ere rhe reper E EE E Pp reper per eerrrrrrrererrrrrerrererrerregrs PEEPPP PPP er erry reper re reer erperrererper EEEE EE PEE EE TENE EEE PELI 1111 OK Copy took 0 01 11 hh mm ss 3 56 Copying Files 3 Managing System Logs The switch allows you to control the logging of error messages including the type of events that are recorded in switch memory logging to a remote System Log syslog server and displays a list of recent event messages The default for all logs is information with the exception of logs in the Remote Log Server which are errors Level Severity Name Description 7 Debug Debugging messages 6 Informational Informational messages only 5 Notice Normal but significant condition such as cold start 4 Warning Warning conditions e g
100. a response to an EAP request identity frame from the client before resending the request Range 1 65535 seconds Default Configuration Timeout period is 30 seconds Command Mode Interface Configuration Ethernet mode Command Usage The default value of this command should be changed only to adjust for unusual circumstances such as unreliable links or specific behavioral problems with certain clients and authentication servers 4 239 4 Command Line Interface Example The following command sets the number of seconds that the device waits for a response to an EAP request identity frame to 3600 seconds Console config interface ethernet 1 e16 Console config if dotlx timeout tx period 3600 Related Commands dot1x port control dot1x re authentication dot1x timeout re authperiod dot1x timeout quiet period dot1x max req dot1x timeout supp timeout dot1x timeout server timeout show dot1x show dot1x users dot1x max req The dot1x max req Interface Configuration mode command sets the maximum number of times that the device sends an Extensible Authentication Protocol EAP request identity frame assuming that no response is received to the client before restarting the authentication process To return to the default configuration use the no form of this command Syntax dotix max req count no dot1x max req count Number of times that the device sends an EAP request identity frame before rest
101. a packet e auth Indicates authentication of a packet without encrypting it e priv Indicates authentication of a packet with encryption e port Specifies the UDP port of the host to use If unspecified the default UDP port number is 162 Range 1 65535 e filtername Specifies a string that defines the filter for this host If unspecified nothing is filtered Range 1 30 characters seconds Specifies the number of seconds to wait for an acknowledgment before resending informs If unspecified the default timeout period is 15 seconds Range 1 300 e retries Specifies the maximum number of times to resend an inform request If unspecified the default maximum number of retries is 3 Range 1 255 Default Setting This command has no default configuration Command Mode Global Configuration mode Command Usage A user and notification view are not automatically created Use the snmp server user snmp server group and snmp server view Global Configuration mode commands to generate a user group and notify group respectively 4 461 4 Command Line Interface Example The following example configures an SNMPv3 host console config snmp server v3 host 192 168 0 20 john noauth Related Commands show snmp snmp server trap authentication The snmp server trap authentication Global Configuration mode command enables the device to send SNMP traps when authentication fails To disable SNMP faile
102. address ip default gateway ip default gateway The ip default gateway Global Configuration mode command defines a default gateway To return to the default configuration use the no form of this command Syntax ip default gateway p address no ip default gateway jjp address Valid IP address of the default gateway Default Setting No default gateway is defined 4 361 4 Command Line Interface Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example defines default gateway 192 168 1 1 Console config ip default gateway 192 168 1 1 Related Commands ip address ip address dhcp show ip interface The show ip interface Privileged EXEC mode command displays the usability status of configured IP interfaces Syntax show ip interface ethernet interface number vlan vian id port channel port channel number interface number Valid Ethernet port e vlan id Valid VLAN number e port channel number Valid Port channel number Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays the configured IP interfaces and their types Console show ip interface Gateway IP Address Type Activity status LOST dod Static Active 4 362 IP Addressing Commands 4
103. an IP address Security Management and Password Configuration System security is handled through the AAA Authentication Authorization and Accounting mechanism that manages user access rights privileges and management methods AAA uses both local and remote user databases Data encryption is handled through the SSH mechanism The system is delivered with no default password configured all passwords are user defined If a user defined password is lost a password recovery procedure can be invoked from the Startup menu The procedure is applicable for the local terminal only and allows a one time access to the device from the local terminal with no password entered Configuring Security Passwords Introduction The security passwords can be configured for the following services Console e Telnet e SSH e HTTP e HTTPS Passwords are user defined When creating a user name the default priority is 1 which allows access but not configuration rights A priority of 15 must be set to enable access and configuration rights to the device Although user names can be assigned privilege level 15 without 2 22 Security Management and Password Configuration 2 a password it is recommended to always assign a password If there is no specified password privileged users can access the Web interface with any password Configuring an Initial Console Password To configure an initial console password enter the following commands
104. are dropped For example if queue 2 is presently using 50 of the bandwidth 3 189 B Configuring the Switch Tail Drop Queue No Threshold 0 100 betes tate 1 2 a 3 Po w z fom Aee Figure 3 89 Tail Drop Page CLI The following is an example of the CLI commands used to configure tail dropping Viewing the Policy Table The Policy Table Page provides parameters for defining policies Command Attributes e Interface Selects an interface Policy Name Contains a list of user defined policies that can be attached to the interface Remove Removes policies Checked Removes the selected policies Unchecked Maintains the policies Web Click Policy Advanced Mode Policy Profile Policy Table define the fields and click Apply 3 190 Configuring Quality of Service 3 Policy Binding Intortace Policy Name Remove c Figure 3 90 Policy Table Page CLI The following is an example of the CLI commands used to bind policies Console gt show policy map 4 411 Policy Map policyl class classl set Ip dscp 7 Policy Map policy2 class class 2 police 96000 4800 exceed action drop class class3 police 124000 96000 exceed action policed dscp transmit 3 191 B Configuring the Switch Multicast Filtering Multicasting is used to support real time applications such as video conferencing or streaming audio A multicast server does not have to e
105. assigned packets based only on an IP based ACL ora MAC based ACL Class Map B is assigned to packets based on both an IP based and a MAC based ACL The Class Map Page contains parameters for defining class maps Command Attributes Class Map Name Displays the user defined name of the class map Preferred ACL Indicates if packets are first matched to an IP based ACL ora MAC based ACL ACL 1 Contains a list of the user defined ACLs Match Indicates the criteria used to match class maps with an ACL s address Possible values are And Matches both ACL 1 and ACL 2 to the packet Or Matches either ACL 1 or ACL 2 to the packet ACL 2 Contains a list of the user defined ACLs 3 186 Configuring Quality of Service 3 Web Click Policy Basic Mode DSCP Rewrite define the fields and click Apply s RaM ACL y Match ACL 2 Modify Remove rd Cc 2a m Figure 3 87 Class Map Page CLI The following is an example of the CLI commands used to define class maps Console config class map class1 4 407 Console config cmap match access group roy rogers Defining Policies A policy is a collection of classes each of which is a combination of a class map and a QoS action to apply to matching traffic Classes are applied in a first fit manner within a policy Before configuring policies for classes whose match criteria are defined in a class map aclass map must first be defi
106. be running the same software version Switch stacking and configuration is maintained by the Stacking Master The Stacking Master detects and configures the ports with minimal operational impact in the event of e Unit Failure e Inter unit Stacking Link Failure Unit Insertion e Removal of a Stacking Unit This section provides an introduction to the user interface and includes the following topics e Understanding the Stack Topology e Stacking Failover Topology e Exchanging Stacking Members e Switching between the Stacking Master and the Secondary Master Understanding the Stack Topology The devices operate in a Ring topology A stacked Ring topology is where all devices in the stack are connected to each other forming a circle Each device in the stack accepts data and sends it to the device to which it is attached The packet continues through the stack until it reaches its destination The system discovers the optimal path on which to send traffic Most difficulties incurred in Ring topologies occur when a device in the ring becomes non functional or a link is severed In a stack the system automatically switches to a Stacking Failover topology without any system downtime An SNMP message is automatically generated but no stack management action is required However the stacking link or stacking member must be repaired to ensure the stacking integrity 3 36 Managing Device Information 3 After the stacking issues ar
107. becomes the Root Bridge The default value is 32768 The port priority value is provided in increments of 4096 Hello Time 1 10 Specifies the device Hello Time The Hello Time indicates the amount of time in seconds a Root Bridge waits between configuration messages The default is 2 seconds Max Age 6 40 Specifies the device Maximum Age Time The Maximum Age Time is the amount of time in seconds a bridge waits before sending configuration messages The default Maximum Age Time is 20 seconds Forward Delay 4 30 Specifies the device Forward Delay Time The Forward Delay Time is the amount of time in seconds a bridge remains in a listening and learning state before forwarding packets The default is 10 seconds Bridge ID Identifies the Bridge priority and MAC address Root Bridge ID Identifies the Root Bridge priority and MAC address Root Port Indicates the port number that offers the lowest cost path from this bridge to the Root Bridge This field is significant when the bridge is not the Root Bridge The default is zero Root Path Cost The cost of the path from this bridge to the Root Bridge Topology Changes Counts Specifies the total amount of STP state changes that have occurred Last Topology Change Indicates the amount of time that has elapsed since the bridge was initialized or reset and the last topographic change that occurred The time is displayed in a day hour minute
108. broadcast rate Interface Configuration Ethernet mode command configures the maximum broadcast rate To return to the default configuration use the no form of this command Syntax port storm control broadcast rate rate no port storm control broadcast rate e rate Maximum kilobits per second of broadcast and multicast traffic on a port e Possible values are in a range of 70K 100 m for FE ports or 3 5 M 1 G for GE ports Default Setting The default storm control broadcast rate is 70 Kbits Sec for FE ports The default storm control broadcast rate is 12 000 Kbits Sec for GE ports Command Mode Interface Configuration Ethernet mode Command Usage Use the port storm control broadcast enable Interface Configuration mode command to enable broadcast storm control Example The following example configures the maximum storm control broadcast rate at 900 Kbits Sec on Ethernet port 1 e5 of a device Console config interface ethernet 1 e5 Console config if port storm control broadcast rate 900 Related Commands port storm control include multicast IC port storm control broadcast enable show ports storm control show ports storm control The show ports storm control User EXEC mode command displays the storm control configuration 4 342 GVRP Commands 4 Syntax show ports storm control interface interface A valid Ethernet port Full syntax unit port Default Setting This command has no
109. can be used by endstations and switches to register and propagate multicast group membership information in a switched environment so that multicast data frames are propagated only to those parts of a switched LAN containing registered endstations Formerly called Group Address Registration Protocol Generic Multicast Registration Protocol GMRP GMRPP allows network devices to register end stations with multicast groups GMRP requires that any participating network devices or end stations comply with the IEEE 802 1p standard Group Attribute Registration Protocol GARP See Generic Attribute Registration Protocol IEEE 802 1D Specifies a general method for the operation of MAC bridges including the Spanning Tree Protocol IEEE 802 10 VLAN Tagging Defines Ethernet frame tags which carry VLAN information It allows switches to assign endstations to different virtual LANs and defines a standard way for VLANs to communicate across switched networks IEEE 802 1p An IEEE standard for providing quality of service QoS in Ethernet networks The standard uses packet tags that define up to eight traffic classes and allows switches to transmit packets based on the tagged priority value IEEE 802 1s An IEEE standard for the Multiple Spanning Tree Protocol MSTP which provides independent spanning trees for VLAN groups IEEE 802 1x Port Authentication controls access to the switch ports by requiring users to first enter a user I
110. ce166DqVx1gWmN ZzNR4DYDvSzg01DnwCAC8Qh Fingerprint a4 16 46 23 5a 8d 1d b5 37 59 eb 44 13 b9 33 e9 Related Commands crypto key generate dsa crypto key generate rsa ip ssh pubkey auth user key key string show crypto key mypubkey show crypto key pubkey chain ssh user key The user key SSH Public Key string Configuration mode command specifies which SSH public key is manually configured To remove an SSH public key use the no form of this command Syntax user key username rsa dsa no user key username username Specifies the username of the remote SSH client Range 1 48 characters e rsa Indicates the RSA key pair e dsa Indicates the DSA key pair Default Setting No SSH public keys exist 4 515 4 Command Line Interface Command Mode SSH Public Key string Configuration mode Command Usage Follow this command with the key string SSH Public Key String Configuration mode command to specify the key Example The following example enables manually configuring an SSH public key for SSH public key chain bob console config crypto key pubkey chain ssh console config pubkey chain user key bob rsa console config pubkey key key string row AAAAB3NzaClyc2 EAAAADAQABAAABAOCvTnRwPW1L Related Commands crypto key generate dsa crypto key generate rsa ip ssh pubkey auth crypto key pubkey chain ssh key string show crypto key mypubkey show crypto key pubkey chai
111. certificate Generates a self signed HTTPS certificate GE 4 598 generate crypto certificate Generates and displays certificate requests for HTTPS PE 4 599 request crypto certificate Imports a certificate signed by the Certification Authority for GC 4 600 import HTTPS ip https certificate Configures the active certificate for HTTPS To return to the GC 4 601 default configuration use the no form of this command show crypto Displays the SSH certificates of the device PE 4 602 certificate mycertificate show ip http Displays the HTTP server configuration PE 4 603 show ip https Displays the HTTPS server configuration PE 4 604 ip http server The ip http server Global Configuration mode command enables configuring the device from a browser To disable this function use the no form of this command Syntax ip http server no ip http server Default Setting HTTP server is enabled Command Mode Global Configuration Command Usage Only a user with access level 15 can use the Web server 4 595 4 Command Line Interface Example The following example enables configuring the device from a browser console config ip http server Related Commands ip http port show ip http ip http port The ip http port Global Configuration mode command specifies the TCP port to be used by the Web browser interface To return to the default configuration use the no form of this command Syntax
112. client poll no sntp unicast client poll Default Setting Polling is disabled Command Mode Global Configuration mode Command Usage Polling time is determined by the sntp client poll timer Global Configuration mode command Example The following example enables polling for Simple Network Time Protocol SNTP predefined unicast clients Console config sntp unicast client poll Related Commands sntp authentication key sntp authenticate sntp trusted key sntp client poll timer sntp broadcast client enable sntp anycast client enable sntp unicast client enable sntp server The sntp server Global Configuration mode command configures the device to use the Simple Network Time Protocol SNTP to request and accept SNTP traffic from a specified server To remove a server from the list of SNTP servers use the no form of this command Syntax sntp server ip address hostname poll key keyia no sntp server host jp address P address of the server 4 310 Clock Commands 4 hostname Hostname of the server Range 1 158 characters e poll Enable polling e keyid Authentication key to use when sending packets to this peer Range 1 4294967295 Default Setting No servers are defined Command Mode Global Configuration mode Command Usage Up to 8 SNTP servers can be defined Use the sntp unicast client enable Global Configuration mode command to enable predefined unicast client
113. config ip al permit rsvp 192 1 1 1 0 0 0 0 any dscp 56 4 266 Console config ip al deny rsvp 192 1 1 1 0 0 0 255 any 4 269 3 124 Defining Access Control Lists 3 Defining MAC Based Access Control Lists The MAC Based ACL Page page allows a MAC based ACL to be defined ACEs can be added only if the ACL is not bound to an interface Command Attributes ACL Name Displays the user defined MAC based ACLs Remove Removes the IP based ACLs The possible field values are Checked Removes the selected MAC based ACL Unchecked Maintains the MAC based ACLs Priority Indicates the ACE priority which determines which ACE is matched to a packet on a first match basis The possible field values are 1 2147483647 Action Indicates the ACL forwarding action Possible field values are Permit Forwards packets which meet the ACL criteria Deny Drops packets which meet the ACL criteria Shutdown Drops packet that meet the ACL criteria and disables the port to which the packet was addressed Ports are reactivated from the nterface Configuration Page Source MAC Address Matches the source MAC address to which packets are addressed to the ACE Destination MAC Address Matches the destination MAC address to which packets are addressed to the ACE VLAN ID 1 4063 4095 Matches the packet s VLAN ID to the ACE The possible field values are 1 to 4095 Web Click Security
114. default configuration Command Mode User EXEC mode Command Usage There are no user guidelines for this command Example The following example displays the storm control configuration Console show ports storm control Port State Rate Kbits Included Sec 1 el Enabled 70 Broadcast Multicast Unknown Unicast 2 el Enabled 100 Broadcast 3 el Disabled 100 Broadcast Related Commands port storm control include multicast IC port storm control broadcast enable port storm control broadcast rate GVRP Commands Table 4 13 GVRP Commands Command Function Mode Page gvrp enable Enables GVRP globally To disable GVRP on the device use the GC 4 344 Global no form of this command gvrp enable Enables GVRP on an interface To disable GVRP on an interface IC 4 345 Interface use the no form of this command 4 343 4 Command Line Interface Table 4 13 GVRP Commands error statistics Command Function Mode Page garp timer Adjusts the values of the join leave and leaveall timers of GARP IC 4 345 applications To return to the default configuration use the no form of this command gvrp Disables dynamic VLAN creation or modification To enable IC 4 346 vlan creation forbid dynamic VLAN creation or modification use the no form of this command t gvrp Deregisters all dynamic VLANs on a port and prevents VLAN IC 4 347 registration forbid creati
115. e 10 Half Indicates that the port advertises for a 10 Mbps speed port and half duplex mode setting e 10 Full Indicates that the port advertises for a 10 Mbps speed port and full duplex mode setting 100 Half Indicates that the port advertises for a 100 Mbps speed port and half duplex mode setting e 100 Full Indicates that the port advertises for a 100 Mbps speed port and full duplex mode setting 1000 Half Indicates that the port advertises for a 1000 Mbps speed port and half duplex mode setting 1000 Full Indicates that the port advertises for a 1000 Mbps speed port and full duplex mode setting e Back Pressure Displays the back pressure mode on the Port Back pressure mode is used with half duplex mode to disable ports from receiving messages e Flow Control Displays the flow control status on the port Operates when the port is in full duplex mode e MDI MDIX Displays the MDI MDIX status on the port Hubs and switches are deliberately wired opposite the way end stations are wired so that when a hub or switch is connected to an end station a straight through Ethernet cable can be used and the pairs are matched up properly When two hubs or switches are connected to each other or two end stations are connected to each other a crossover cable is used to ensure that the correct pairs are connected The possible field values are Auto Use to automatically detect the cable type MDI Media Dep
116. e3 Ethernet e3 Port 3 wrong port type 2 Notify Q depth qid size 1 300 2 300 3 300 4 300 qid threshTMibScalarC_SetValue var rllfProfileName mismatching between var mib type and object type 10 TMibScalarC_SetValue var rllfProfileName mismatching between var mib type and object type 20 TMibScalarC_SetValue var rllfProfileName mismatching between var mib type and object type 30 TMibScalarC_SetValue var rllfProfileName mismatching between var mib type and object type 40 qid WRED thresh0O thresh1 thresh2 TMibScalarC_SetValue var rllfProfileName mismatching between var mib type and object type 1 disable 000 TMibScalarC_SetValue var rllfProfileName mismatching between var mib type and object type 2 disable 0 0 0 TMibScalarC_SetValue var rllfProfileName mismatching between var mib type and object type 3 disable 000 TMibScalarC_SetValue var rllfProfileName mismatching between var mib type and object type 4 disable 000 qid MinDPO MaxDPO ProbDPO MinDP1 MaxDP1 ProbDP1 MinDP2 MaxDP2 ProbDP2 weight TMibScalarC_ SetValue var rlIfProfileName mismatching between var mib type and object type 1 N A N A N A N A N A N A N A N A N A N A TMibScalarC SetValue var rlIfProfileName mismatching between var mib type and object type 2 N A N A N A N A N A N A N A N A N A N A TMibScalarC SetValue var rlIfProfileName mismatching between var mib type and object type 3 N A N A N A N A N A N A N A N A N A N A TMibScala
117. following is an example PoE interface commands Console config interface ethernet 1 e14 323 Console config power inline auto 4 399 Console config power inline powered device IP phone 4 399 Console config power inline priority high 4 400 Configuring IP Information This section describes how to configure an initial IP interface for management access over the network The IP address for this switch is unassigned by default To manually configure an address you need to change the switch IP address and netmask to values that are compatible with your network You may also need to establish a default gateway between the switch and management stations that exist on another network segment You can manually configure a specific IP address or direct the device to obtain an address from a DHCP server Valid IP addresses consist of four decimal numbers 0 to 255 separated by periods Anything outside this format will not be accepted by the CLI program Defining IP Addresses The P Interface Page contains fields for assigning IP parameters to interfaces and for assigning gateway devices Packets are forwarded to the default IP when frames are sent to a remote network The configured IP address must belong to the same IP address subnet of one of the IP interfaces Command Attributes e IP Address Displays the currently configured IP address e Mask Displays the currently configured IP address mask e Interface
118. for this command Example The following example describes the help system console help Help may be requested at any point in a command by entering a question mark If nothing matches the currently entered incomplete command the help list is empty This indicates that for a query at this point there is no command matching the current input If the request is within a command enter backspace and erase the entered characters to a point where the request results in a display Help is provided when 1 There is a valid command and a help request is made for entering a parameter or argument e g show All possible parameters or arguments for the entered command are displayed 2 An abbreviated argument is entered and a help request is made for arguments matching the input e g show pr Related Commands All commands are related terminal data dump The terminal data dump User EXEC mode command enables dumping all the output of a show command without prompting To disable dumping use the no form of this command Syntax terminal data dump no terminal data dump Default Setting Dumping is disabled Command Mode User EXEC mode Command Usage By default a More prompt is displayed when the output contains more lines than can be displayed on the screen Pressing the Enter key displays the next line pressing the Spacebar displays the next screen of output The data dump command enables dumping all output
119. gt show rmon events Inde Description Type x Bl Errors Log 2 High Log Trap Broadcast Manage E Last time sent Jan 18 2002 23 58 17 Jan 18 2002 23 59 48 4 448 The following table describes significant fields shown above RMON Commands 4 Field Description Index An index that uniquely identifies the event Description A comment describing this event Type The type of notification that the device generates about this event Can have the following values none log trap log trap In the case of log an entry is made in the log table for each event In the case of trap an SNMP trap is sent to one or more management stations Community If an SNMP trap is to be sent itis sent to the SNMP community specified by this octet string Owner The entity that configured this event this value is zero Lasttime sent The time this entry last generated an event If this entry has not generated any events Related Commands rmon event show rmon log The show rmon log User EXEC mode command displays the RMON log table Syntax show rmon log event e event Specifies the event index Range 0 65535 Default Setting This command has no default configuration Command Mode User EXEC mode Command Usage There are no user guidelines for this command Example The following example displays the RMON log table Console gt show rmon log Maximum table size 500
120. id 128 1 Port cost 20000 Type P2p configured auto Boundary RSTP Port Fast No configured no Designated bridge Priority 32768 Address 00 01 42 97 e0 00 Designated port id 128 25 Designated path cost 0 Number of transitions to forwarding state 1 BPDU sent 2 received 120638 Port 2 1 e2 enabled State Forwarding Role Designated Port id 128 2 Port cost 20000 Type Shared configured auto Boundary Port Fast No configured no STP Designated bridge Priority 32768 Address 00 02 4b 29 7a 00 Designated port id 128 2 Designated path cost 20000 Number of transitions to forwarding state 1 BPDU sent 2 received 170638 Port 3 1 e3 enabled State Forwarding Role Designated Port id 128 3 Port cost 20000 Type Shared configured auto Internal Port Fast No configured no Designated bridge Priority 32768 Address 00 02 4b 29 7a 00 Designated port id 128 3 Designated path cost 20000 Number of transitions to forwarding state 1 BPDU sent 2 received 170638 Port 4 1 e4 enabled State Forwarding Role Designated 4 505 4 Command Line Interface Port id 128 4 Type Shared configured auto Internal Designated bridge Priority 32768 Designated port id 128 2 Number of transitions to forwarding state received 170638 BPDU sent 2 Number of transitions to forwarding state BPDU sent 2 received 120638 4 506 1 1 Port cost 20000 Port Fast No config
121. information request information reply address mask request address mask reply traceroute datagram conversion error mobile host redirect ipv6 where are you ipv6 i am here mobile registration request mobile registration reply domain name request domain name reply skip and photuris Range 0 255 icmp code Specifies an ICMP message code for filtering ICMP packets ICMP packets that are filtered by ICMP message type can also be filtered by the ICMP message code Range 0 255 igmp type IGMP packets can be filtered by IGMP message type Enter a number or one of the following values dvmrp host query host report pim or trace host report v2 host leave v2 host report v3 Range 0 255 destination port Specifies the UDP TCP destination port Range 0 65535 source port Specifies the UDP TCP source port Range 0 65535 e list of flags Specifies a list of TCP flags that can be triggered If a flag is set it is prefixed by If a flag is not set it is prefixed by Possible values urg ack psh rst syn fin urg ack psh rst syn and fin The flags are concatenated into one string For example fin ack Default Setting No IPv4 ACL is defined Command Mode IP Access List Configuration mode Command Usage Use the ip access list Global Configuration mode command to enable the IP Access List Configuration mode Before an Access Control Element ACE is added to an ACL
122. meters Console test copper port tdr 2 gl Can t perform this test on fiber ports Related Commands show copper ports tdr show copper ports cable length show copper ports tdr The show copper ports tdr User EXEC mode command displays information on the last Time Domain Reflectometry TDR test performed on copper ports Syntax show copper ports tdr interface interface A valid Ethernet port Full syntax unit port Default Setting This command has no default configuration Command Mode User EXEC mode Command Usage The maximum length of the cable for the TDR test is 120 meter 4 390 PHY Diagnostics Commands 4 Example The following example displays information on the last TDR test performed on all copper ports Console gt show copper ports tdr Port Result Length meters Date Jel OK e2 Short 50 13 32 00 23 July 2005 e3 Test has not been performed e4 Open 64 13 32 00 23 July 2005 gl Fiber Related Commands test copper port tdr show copper ports cable length show copper ports cable length The show copper ports cable length User EXEC mode command displays the estimated copper cable length attached to a port Syntax show copper ports cable length interface e interface A valid Ethernet port Full syntax unit port Default Setting This command has no default configuration Command Mode User EXEC mode Command Usage The port must be active and wo
123. name e Access Level Displays the user access level The lowest user access level is 1 and the highest is 15 Users with access level 15 are Privileged Users and only they can access and use the EWS e Lockout Status Displays the user access status e Remove Removes the user from the User Name list The possible field values are e Checked Removes the selected local user e Unchecked Maintains the local users e Password Defines the local user password Local user passwords can contain up to 159 characters e Confirm Password Verifies the password Web Click System Passwords Local Users define the fields and click Apply 3 90 Configuring User Authentication 3 Local Users User Mame Access Level Reactivate Usar Resor n n Figure 3 34 Local Users Passwords Page CLI The following is an example of the CLI commands used for configuring Local Users Passwords Console config username bob password lee level 15 4 264 Defining Line Passwords Network administrators can define line passwords in the Line Password Page After the line password is defined a management method is assigned to the password The device can be accessed using the following methods Console e Telnet e Secure Telnet To define line passwords The Line Password Page contains the following fields e Console Line Password Defines the line password for accessing the device via a Con
124. of this command logging Logs messages to a syslog server To delete the syslog server GC 4 522 with the specified address from the list of syslogs use the no form of this command logging console Limits messages logged to the console based on severity To GC 4 523 disable logging to the console use the no form of this command logging buffered Limits syslog messages displayed from an internal buffer based GC 4 524 on severity To cancel using the buffer use the no form of this command logging buffered Changes the number of syslog messages stored in the internal GC 4 525 size buffer To return to the default configuration use the no form of this command clear logging Clears messages from the internal logging buffer PE 4 525 logging file Limits syslog messages sent to the logging file based on severity GC To cancel using the buffer use the no form of this command clear logging file Clears messages from the logging file PE 4 526 aaa logging Enables logging AAA login events To disable logging AAA login GC 4 527 events use the no form of this command file system logging Enables logging file system events To disable logging file system GC 4 528 events use the no form of this command management Enables logging management access list ACL events To GC 4 528 logging disable logging management access list events use the no form of this command show logging Displays the state of logging and the syslog messages stored in PE 4
125. operation You can set the switch to use new firmware without overwriting the previous version The system run time software and configuration information is kept in files which may be saved copied uploaded for host based storage and manipulation The system files include Boot Files The system uses two identical copies of the boot image stored in flash The first copy is used when the system comes up Software Image Files two images are stored The device boots from one and the other is used as a redundant backup Startup Configuration File Contains the commands required to reconfigure the device to the same settings as when the device is powered down or rebooted The Startup file is created by copying the configuration commands from the Running Configuration file or the Backup Configuration file e Running Configuration File Contains all configuration file commands as well as all commands entered during the current session After the device is powered down or rebooted all commands stored in the Running Configuration file are lost During the startup process all commands in the Startup file are copied to the Running Configuration File and applied to the device During the session all new commands entered are added to the commands existing in the Running Configuration file Commands are not overwritten To update the Startup file before powering down the device the Running Configuration file must be copied to the
126. p address hostname community string traps informs 1 2 udp port port filter filtername timeout seconds retries retries no snmp server host p address hostname traps informs ijp address Specifies the IP address of the host targeted recipient hostname Specifies the name of the host Range 1 158 characters community string Specifies a password like community string sent with the notification operation Range 1 20 traps Indicates that SNMP traps are sent to this host If unspecified SNMPvz2 traps are sent to the host informs Indicates that SNMP informs are sent to this host Not applicable to SNMPv1 1 Indicates that SNMPv1 traps will be used 2 Indicates that SNMPv2 traps will be used port Specifies the UDP port of the host to use If unspecified the default UDP port number is 162 Range 1 65535 filtername Specifies a string that defines the filter for this host If unspecified nothing is filtered Range 1 30 characters seconds Specifies the number of seconds to wait for an acknowledgment before resending informs If unspecified the default timeout period is 15 seconds Range 1 300 retries Specifies the maximum number of times to resend an inform request If unspecified the default maximum number of retries is 3 Range 1 255 Default Setting This command has no default configuration Command Mode Global Configuration mode Command Usage When
127. parameters Command Attributes Enable SNMP Notifications Specifies whether the device can send SNMP notifications The possible field values are Enable Enables SNMP notifications Disable Disables SNMP notifications Enable Authentication Notifications Specifies whether SNMP authentication failure notification is enabled on the device The possible field values are Enable Enables the device to send authentication failure notifications Disable Disables the device from sending authentication failure notifications Web Click SNMP Trap Management Global Trap Settings Define the fields and click Apply Global Trap Settings Enable SNMP Heaticatone I Enable Anteetication r Nessi ations Figure 3 31 SNMP Notification Properties Page CLI The following is an example of the SNMP commands for enabling traps Console config snmp server enable traps 4 458 3 85 3 Configuring the Switch Defining SNMP Notification Filters The Trap Filter Settings Page permits filtering traps based on OIDs Each OID is linked to a device feature or a portion of a feature The Trap Filter Settings Page also allows network managers to filter notifications Command Attributes Filter Name Contains a list of user defined notification filters Object ID Subtree Displays the OID for which notifications are sent or blocked If a filter is attached to an OID traps or informs are gener
128. port Full syntax unit port port channel number A valid port channel number Default Setting This command has no default configuration 4 350 IGMP Snooping Commands Command Mode User EXEC mode Command Usage There are no user guidelines for this command Example The following example displays GVRP statistical information 4 Console gt show gvrp error statistics GVRP Error Statistics Legend INVPROT Invalid Protocol Id INVALEN Invalid Attribute Length INVATYP Invalid Attribute INVEVENT Invalid Event Type INVAVAL Invalid Attribute Value Port INVPROT INVATYP INVAVAL INVALEN INVEVENT Related Commands clear gvrp statistics show gvrp statistics IGMP Snooping Commands Table 4 14 IGMP Snooping Commands Command Function Mode Page ip igmp snooping Enables Internet Group ManagementP rotocol IGMP snooping GC 4 352 Global To disable IGMP snooping use the no form of this command ip igmp snooping Enables Internet Group Management Protocol IGMP snooping ICV 4 352 Interface on a specific VLAN To disable IGMP snooping on a VLAN interface use the no form of this command ip igmp snooping Enables automatic learning of multicast device ports in the context ICV 1 133 mrouter of a specific VLAN To remove automatic learning of multicast learn pim dvmrp device ports use the no form of this command p igmp snooping Configures the host time out If a
129. port channel port channel number interface Valid Ethernet port Full syntax unit port port channel number Valid port channel number Default Setting This command has no default configuration Command Modes Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays the configuration of all configured interfaces Console show interfaces configuration Port Type Duplex Speed Neg Flow Link Back Mdix Ctrl State Pressure Mode 1 el 100M Copper Full 00 Enabled Off Up Disabled Auto 1 e2 100M Copper Full 00 Enabled Off Up Disabled Auto 1 e3 100M Copper Full 00 Enabled Off Up Disabled Auto 1 e4 100M Copper Full 00 Enabled Off Up Disabled Auto 1 e5 100M Copper Full 00 Enabled Off Up Disabled Auto 1 e6 100M Copper Full 00 Enabled Off Up Disabled Auto 1 e7 100M Copper Full 00 Enabled Off Up Disabled Auto 1 e8 100M Copper Full 00 Enabled Off Up Disabled Auto 1 e9 100M Copper Full 00 Enabled Off Up Disabled Auto 1 e10 100M Copper Full 00 Enabled Off Up Disabled Auto 1 ell 100M Copper Full 00 Enabled Off Up Disabled Auto 1 e12 100M Copper Full 00 Enabled Off Up Disabled Auto 1 e13 100M Copper Full 00 Enabled Off Up Disabled Auto 4 334 Ethernet Configuration Commands 4 e14 00M Copper Ful 00 Enabled Off Up Disabled Auto e15 00M Copper Ful 00 Enabled off Up Disabled Auto e16 00M Copper Ful 00 Enabled off Up Disabled Auto e17 00M Coppe
130. radius server timeout value and selecting the lower of the two values 4 242 802 1x Commands 4 Example The following example sets the time for the retransmission of packets to the authentication server to 3600 seconds Console config if dotlx timeout server timeout 3600 Related Commands dot1x port control dot1x re authentication dot1x timeout re authperiod dot1x timeout quiet period dot1x timeout tx period dot1x max req dot1x timeout supp timeout show dot1x show dot1x users show dot1x The show dot1x Privileged EXEC mode command displays the 802 1X status of the device or specified interface Syntax show dot1x ethernet interface e interface Valid Ethernet port Full syntax unit port Default Configuration This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays the status of 802 1 X enabled Ethernet ports Console show dot1x 802 1x is enabled 4 243 4 Command Line Interface Port Admin Mode Oper Mode 1 el Auto Authorized 1 e2 Auto Authorized 1 e3 Auto Unauthorized 1 e4 Force auth Authorized 1 e5 Force auth Unauthorized Port is down or not present Console show dot1lx ethernet 1 e3 802 1x is enabled Port Admin Mode Oper Mode 1 e3 Auto Unauthorized Quiet period 60 Seconds Tx period 30 Seconds Max req 2 Supplicant tim
131. rsa Global Configuration mode command generates RSA key pairs Syntax crypto key generate rsa Default Setting RSA key pairs do not exist 4 512 SSH Commands 4 Command Mode Global Configuration mode Command Usage RSA keys are generated in pairs one public RSA key and one private RSA key If the device already has RSA keys a warning and prompt to replace the existing keys with new keys are displayed This command is not saved in the device configuration however the keys generated by this command are saved in the private configuration which is never displayed to the user or backed up on another device RSA keys are saved to the backup master This command may take a considerable period of time to execute Example The following example generates RSA key pairs console config crypto key generate rsa Related Commands crypto key generate dsa ip ssh pubkey auth crypto key pubkey chain ssh user key key string show crypto key mypubkey show crypto key pubkey chain ssh ip ssh pubkey auth The ip ssh pubkey auth Global Configuration mode command enables public key authentication for incoming SSH sessions To disable this function use the no form of this command Syntax ip ssh pubkey auth no ip ssh pubkey auth Default Setting Public Key authentication fo incoming SSH sessions is disabled Command Mode Global Configuration mode Command Usage AAA authentication is independent 4 513
132. s origin is authenticated e Privacy Encrypts SNMP messages Operation Defines the group access rights The possible field values are e Read Management access is restricted to read only and changes cannot be made to the assigned SNMP view Write Management access is read write and changes can be made to the assigned SNMP view e Notify Sends traps for the assigned SNMP view e Remove Removes SNMP groups The possible field values are Checked Removes the selected SNMP group e Unchecked Maintains the SNMP groups 3 80 Configuring SNMP 3 Web Click SNMP SNMPv3 Users Click New to configure a user name In the New User page define a name and assign it to a group then click Add to save the configuration and return to the User Name list To delete a user check the box next to the user name then click Delete To change the assigned group of a user click Change Group in the Actions column of the users table and select the new group Groups ntan Gaoup Name Security Model Security Level Comert Operation Read Write Motity Medity Remove 1 77 Cc rials gt m ne ia Dyos Seosty Figure 3 28 SNMP Group Profile Page CLI The following is an example of the SNMP CLI commands Console config snmp server group user group v3 priv read user view 4 454 Defining SNMP Group Members The SNMP Group Membership Page enables assigning system users to SNMP g
133. show authentication methods 4 256 AAA Commands 4 aaa authentication enable The aaa authentication enable Global Configuration mode command defines authentication method lists for accessing higher privilege levels To return to the default configuration use the no form of this command Syntax aaa authentication enable default list name method method2 no aaa authentication enable default ist name e default Uses the listed authentication methods that follow this argument as the default list of methods when using higher privilege levels e flist name Character string used to name the list of authentication methods activated when using access higher privilege levels Range 1 12 characters e method method2 Specify at least one from the following table Keyword Description enable Uses the enable password for authentication line Uses the line password for authentication none Uses no authentication radius Uses the list of all RADIUS servers for authentication Uses username enabx where x is the privilege level tacacs Uses the list of all TACACS servers for authentication Uses username enabx where x is the privilege level Default Setting If the default list is not set only the enable password is checked This has the same effect as the command aaa authentication enable default enable On the console the enable password is used if it e
134. show ip igmp snooping multicast tv vlan vian id vian id VLAN ID of the Multicast TV VLAN Default Configuration This command has no default configuration Command Mode Priviledged EXEC mode Usage Guidelines There are no user guidelines for this command Example The following example displays the IP addresses associated with Multicast TV VLANs console show ip igmp snooping multicast tv VLAN IP address ooooo 000 NYNDUPRPWNRO 4 587 4 Command Line Interface Related Commands ip igmp snooping multicast tv switchport general map macs group vian The switchport general map macs group vian interface configuration mode command sets a mac based classification rule To delete a classification use the no form of the command Syntax switchport general map macs group group vlan vian id no switchport general map macs group group group Specifies group number Range 1 2147483647 e vian id Defines the VLAN ID that is associated with the rule Default Setting This command has no default configuration Command Mode Interface Configuration Ethernet port channel Command Usage MAC based VLAN rules cannot contain overlapping ranges on the same interface The priority between VLAN classification rules is e MAC based VLAN Best match between the rules Subnet based VLAN Best match between the rules e Protocol based VLAN e PVID The interface must be in General Mode to configure a
135. size to the default setting use the no form of this command show line Displays line parameters UE 4 382 line The line Global Configuration mode command identifies a specific line for configuration and enters the Line Configuration command mode Syntax line console telnet ssh console Console terminal line e telnet Virtual terminal for remote console access Telnet e ssh Virtual terminal for secured remote console access SSH Default Setting This command has no default configuration Command Mode Global Configuration mode Command Usage There are no user guidelines for this command 4 371 4 Command Line Interface Example The following example configures the device as a virtual terminal for remote console access Console config line telnet Console config line Related Commands show line speed The speed Line Configuration mode command sets the line baud rate To return to the default configuration use the no form of the command Syntax speed bps no speed e bps Baud rate in bits per second bps Possible values are 2400 9600 19200 38400 57600 and 115200 Default Setting The default speed is 9600 bps Command Mode Line Configuration console mode Command Usage This command is available only on the line console The configured speed is applied when Autobaud is disabled This configuration applies only to the current session E
136. specific IGMP mapping from the selected VLAN e Unchecked Maintains the IGMP mapping Web Click Multicast Multicast TV IGMP Snooping Mapping click Add define the fields and click Apply IGMP Snooping Mapping Add N VLAN Multicast Group Remove 11 2242 13 r eo Figure 3 94 IGMP Snooping Mapping Page 3 198 Multicast Filtering 3 CLI The following is an example of the Multicast Forward All CLI commands switchport access multicast tv vlan ip igmp snooping multicast tv Defining Multicast TV VLAN Membership The Multicast TV Membership Page allows network managers to display the ports associated with a Multicast TV VLAN Note Ports and trunks are assigned to Multicast VLAN in the VLAN Interface Configuration Page Command Attributes e Multicast TV VLAN ID Indicates the Multicast VLAN ID to which the source ports and receiver ports are members Source Port Indicates the source port from which the Multicast TV transmission orginates The source port is learned through the IGMP messages e Receiver Port Indicates the port on which Multicast TV transmissions are received Web Click Multicast Multicast TV Multicast TV Membership click Add define the fields and click Apply Multicast TV VLAN 10 7 Source Ports Receiver Ports Figure 3 95 Multicast TV Membership Page 3 199 B Configuring the Switch CLI The following is an example of the Multicast TV Membership CL
137. tagged VLANs based on the IEEE 802 1Q standard Members of VLAN groups can be dynamically learned via GVRP or ports can be manually assigned to a specific set of VLANs This allows the switch to restrict traffic to the VLAN groups to which a user has been assigned By segmenting your network into VLANs you can e Eliminate broadcast storms which severely degrade performance in a flat network e Simplify network management for node changes moves by remotely configuring VLAN membership for any port rather than having to manually change the network connection e Provide data security by restricting all traffic to the originating VLAN e Use private VLANs to restrict traffic to pass only between data ports and the uplink ports thereby isolating adjacent ports within the same VLAN and allowing you to limit the total number of VLANs that need to be configured e Use protocol VLANs to restrict traffic to specified interfaces based on protocol type Traffic Prioritization This switch prioritizes each packet based on the required level of service using eight priority queues with strict or Weighted Round Robin Queuing It uses IEEE 802 1p and 802 1Q tags to prioritize incoming traffic based on input from the end station application These functions can be used to provide independent priorities for delay sensitive data and best effort data This switch also supports several common methods of prioritizing layer 3 4 traffic to meet application requ
138. the VLAN group s in which it will participate By default all ports are assigned to VLAN 1 as untagged ports Add a port as a tagged port if you want it to carry traffic for one or more VLANs and any intermediate network devices or the host at the other end of the connection supports VLANs Then assign ports on the other VLAN aware network devices along the path that will carry this traffic to the same VLAN s either manually or dynamically using GVRP However if you want a port on this switch to 3 157 B Configuring the Switch participate in one or more VLANs but none of the intermediate network devices nor the host at the other end of the connection supports VLANs then you should add this port to the VLAN as an untagged port Note VLAN tagged frames can pass through VLAN aware or VLAN unaware network interconnection devices but the VLAN tags should be stripped off before passing it on to any end node host that does not support VLAN tagging VLAN Classification When the switch receives a frame it classifies the frame in one of two ways If the frame is untagged the switch assigns the frame to an associated VLAN based on the default VLAN ID of the receiving port But if the frame is tagged the switch uses the tagged VLAN ID to identify the port broadcast domain of the frame Port Overlapping Port overlapping can be used to allow access to commonly shared network resources among different VLAN groups such as file servers or p
139. the host source MAC address connected to the port e PVID Assigns a VLAN ID to untagged packets The possible values are 1 4094 VLAN 4095 is defined as per standard and industry practice as the Discard VLAN Packets classified to the Discard VLAN are dropped e Frame Type Specifies the packet type accepted on the port The possible field values are 3 162 Configuring VLANs 3 e Admit Tag Only Only tagged packets are accepted on the port e Admit All Both tagged and untagged packets are accepted on the port Ingress Filtering Indicates whether ingress filtering is enabled on the port The possible field values are e Enable Enables ingress filtering on the device Ingress filtering discards packets that are defined to VLANs of which the specific port is not a member e Disable Disables ingress filtering on the device e Reserve VLAN Indicates the VLAN selected by the user to be the reserved VLAN if not in use by the system Web Click VLAN VLAN Interface Configuration Define the VLAN interface settings and click Apply Interface Configuration Unine E Intortacs Frame A Interface VAAN Mode OHMIC PVD Typy Fiketing Rosand VLAN Modity z Global System LAGS ta Disatled t0004 Figure 3 71 VLAN Interface Configuration Page CLI The following is an example of the VLAN interface configuration commands Console config interface ethernet 1 e16 4 323 Console config if swit
140. the input interface To detach an ACL from an IC 4 274 input interface use the no form of this command show access lists Displays access control lists ACLs defined on the device PE 4 274 show interfaces Displays access lists applied on interfaces PE 4 275 access lists ip access list The ip access list Global Configuration command enables the IP Access Configuration mode and creates Layer 3 ACLs To delete an ACL use the no form of this command Syntax ip access list name no ip access list name name Specifies the name of the ACL Default Setting The default for all ACLs is deny all Command Mode Global Configuration mode Command Usage Up to 1018 rules can be defined on the device depending on the type of rule defined 4 265 4 Command Line Interface Example The following example shows how to create an IP ACL Console config ip access list ip acll Console config ip al Related Commands permit IP deny IP show access lists service acl match permit IP The permit IP Access List Configuration mode command permits traffic if the conditions defined in the permit statement match Syntax permit any protocol any source source wildcard any destination destination wildcard dscp dscp number ip precedence jip precedence permit icmp any source source wildcara any destination destination wildcard any icmp type any icmp
141. the supplicant was logged on the port Authentication Method Displays the method by which the last session was authenticated The possible field values are e Remote 802 1x authentication is not used on this port port is forced authorized e None The supplicant was not authenticated e RADIUS The supplicant was authenticated by a RADIUS server MAC Address Displays the supplicant MAC address Web Click Security 802 1x Authentication Hosts define the fields and click Apply 3 115 B Configuring the Switch Authentication Host Uses Name Poit Session Time Authentication Method MAC Address S a p 2 Potcy Figure 3 47 Authenticated Hosts Page CLI The following is an example of the Authentication Hosts CLI commands Console show dot1x 4 243 802 1x is enabled Port Admin Mode Oper Mode Reauth Reauth Username Control Period 1 el Auto Authorized Ena 3600 Bob 1 e2 Auto Authorized Ena 3600 John 1 e3 Auto Unauthorized Ena 3600 Clark 1 e4 Force auth Authorized Dis 3600 n a 1 e5 Force auth Unauthorized Dis 3600 n a Port is down or not present 3 116 Port Based Authentication 3 Console show dot1x ethernet 1 e3 802 1x is enabled Port Admin Mode Oper Mode Reauth Reauth Control Period 1 e3 Auto Unauthorized Ena 3600 Quiet period 60 Seconds Tx period 30 Seconds Max req 2 Supplicant timeout 30 Seconds Server timeout 30 Seconds Session Ti
142. this switch and a domain name list has been specified the switch works through the domain list appending each domain name in the list to the host name and checking with the specified name servers for a match When more than one name server is specified the servers are queried in the specified sequence until a response is received or the end of the list is reached with no response e Note that if all name servers are deleted DNS will automatically be disabled 3 200 Configuring Domain Name Service 3 Configuring General DNS Server Parameters The DNS Server Page contains fields for enabling and activating specific DNS servers Command Attributes Enable DNS Enables translating the DNS names into IP addresses The possible field values are Checked Translates the domains into IP addresses e Unchecked Disables translating domains into IP addresses Default Domain Name Specifies the user defined DNS server name e Type Displays the Default Domain Name type The possible field values are e Dynamic Indicates that the Default Domain Name is dynamically created e Static Indicates that the Default Domain Name is a static IP address e Remove Removes DNS servers The possible field values are Checked Removes the selected DNS server e Unchecked Maintains the current DNS server list DNS Server Displays the DNS server IP address DNS servers are added in the Add DNS Server Page e A
143. time The end time is relative to summer time If the starting month is chronologically after the ending month the system assumes that you are in the southern hemisphere USA rule for daylight savings time e Start First Sunday in April e End Last Sunday in October Time 2 am local time EU rule for daylight savings time e Start Last Sunday in March e End Last Sunday in October Time 1 00 am 01 00 Example The following example sets summer time starting on the first Sunday in April at 2 am and finishing on the last Sunday in October at 2 am Console config clock summer time recurring first sun apr 2 00 last sun oct 2 00 Related Commands clock set clock source clock timezone sntp authentication key The sntp authentication key Global Configuration mode command defines an authentication key for Simple Network Time Protocol SNTP To remove the authentication key for SNTP use the no form of this command Syntax sntp authentication key number md5 value no sntp authentication key number number Key number Range 1 4294967295 e value Key value Range 1 8 characters Default Setting No authentication key is defined Command Mode Global Configuration mode Command Usage Multiple keys can be generated 4 303 4 Command Line Interface Example The following example defines the authentication key for SNTP Console config sntp authentication key 8 md5 ClkKey
144. to bind the ACL to an interface for egress checking the bind operation will fail 3 120 Defining Access Control Lists 3 The order in which active ACLs are checked is as follows f 2 3 4 5 6 7 User defined rules in the Egress MAC ACL for egress ports User defined rules in the Egress IP ACL for egress ports User defined rules in the Ingress MAC ACL for ingress ports User defined rules in the Ingress IP ACL for ingress ports Explicit default rule permit any any in the ingress IP ACL for ingress ports Explicit default rule permit any any in the ingress MAC ACL for ingress ports If no explicit rule is matched the implicit default is permit all 3 121 B Configuring the Switch Binding Device Security ACLs When an ACL is bound to an interface all the ACE rules that have been defined are applied to the selected interface Whenever an ACL is assigned on a port or trunk from that ingress interface that do not match the ACL are matched to the default rule which is Drop unmatched packets The ACL Binding Page binds ACLs to interfaces Command Attributes Unit No Displays the stacking member for which the ACLs are defined Copy from Entry Number Copies the ACL information from the defined interface To Row Number s Copies the ACL information to the defined interface Interface Indicates the interface to which the ACL is bound ACL Name Indicates the ACL which is bound the i
145. to year other than the USA and Europe From The time that DST begins each year In the example DST begins locally every first Sunday in April at midnight The possible field values are Day The day of the week from which DST begins every year The possible field range is Sunday Saturday Week The week within the month from which DST begins every year The possible field range is 1 5 Month The month of the year in which DST begins every year The possible field range is Jan Dec Time The time at which DST begins every year The field format is Hour Minute For example 02 10 To The time that DST ends each year In the example DST ends locally every first Sunday in October at midnight The possible field values are Day The day of the week at which DST ends every year The possible field range is Sunday Saturday Week The week within the month at which DST ends every year The possible field range is 1 5 Month The month of the year in which DST ends every year The possible field range is Jan Dec Time The time at which DST ends every year The field format is HH MM For example 05 30 Web Select System Mgmt SNTP Clock Time Zone Define the fields and set the offset for your time zone relative to the UTC and click Apply Sseee SNTP Clock Time Zone A CS Local Setings Date Local Time TEEI T ppenness ea wane Time Zone Otet GMT H 3 F Dayli
146. transfer protocol for updating back up configuration files To download a boot file using XModem 1 Enter the command xmodem boot The switch is ready to receive the file via the XModem protocol and displays text similar to the following Console copy xmodem boot 4 315 Please download program using XMODEM console 2 Specify the path of the source file within 20 seconds If the path is not specified within 20 seconds the command times out To download a software image file using XModem 1 Enter the command xmodem image The switch is ready to receive the file via 2 24 Software Download and Reboot 2 the XModem protocol 2 Specify the path of the source file to begin the transfer process The following is an example of the information that appears Console copy xmodem image 4 315 Please download program using XMODEM console Software Download Through TFTP Server This section contains instructions for downloading device software system and boot images through a TFTP server The TFTP server must be configured before downloading the software See p 3 40 for instructions on downloading to all units The switch boots and runs when decompressing the system image from the flash memory area where a copy of the system image is stored When a new image is downloaded it is saved in the other area allocated for the additional system image copy On the next boot the switch decompr
147. transport protocol and IP as the network layer protocol Glossary 615 Glossary Trivial File Transfer Protocol TFTP A TCP IP protocol commonly used for software downloads User Datagram Protocol UDP UDP provides a datagram mode for packet switched communications It uses IP as the underlying transport mechanism to provide access to IP like services UDP packets are delivered just like IP packets connection less datagrams that may be discarded before reaching their targets UDP is useful when TCP would be too complex too slow or just unnecessary Virtual LAN VLAN A Virtual LAN is a collection of network nodes that share the same collision domain regardless of their physical location or connection point in the network A VLAN serves as a logical workgroup with no physical barriers and allows users to share information and resources as though located on the same LAN XModem A protocol used to transfer files between devices Data is grouped in 128 byte blocks and error corrected Glossary 616 index Numerics 802 1p 3 176 A Access Control Element 3 175 Access Control List See ACL Access Control Lists 3 120 3 174 ACE 3 175 ACEs 3 120 3 175 ACL 3 177 3 186 ACLs 3 174 3 175 Address Resolution Protocol 3 49 Advanced QoS 3 177 ARP 3 49 3 50 Authentication method lists 3 100 Authentication profiles 3 100 Index DNS 3 200 default domain name 3 201 domain name list 3 201 enabling lookup
148. unifl or organization loc location st state cu country number Specifies the certificate number Range 1 2 common name Specifies the fully qualified URL or IP address of the device Range 1 64 organization unit Specifies the organization unit or department name Range 1 64 organization Specifies the organization name Range 1 64 e location Specifies the location or city name Range 1 64 e state Specifies the state or province name Range 1 64 country Specifies the country name Range 1 2 Default Setting There is no default configuration for this command Command Mode Privileged EXEC mode Command Usage Use this command to export a certificate request to a Certification Authority The certificate request is generated in Base64 encoded X 509 format Before generating a certificate request you must first generate a self signed certificate using the crypto certificate generate Global Configuration mode command Be aware that you have to reenter the certificate fields 4 599 4 Command Line Interface After receiving the certificate from the Certification Authority use the crypto certificate import Global Configuration mode command to import the certificate into the device This certificate replaces the self signed certificate Example The following example generates and displays a certificate request for HTTPS console crypto certificate 1 request
149. 0 000 Default Setting Default path cost is determined by port speed and path cost method long or short as shown below Interface Long Short Port channel 20 000 4 Gigabit E thernet 1000 Mbps 20 000 4 4 486 Spanning Tree Commands 4 Fast Ethernet 100 Mbps 200 000 19 Ethernet 10 Mbps 2 000 000 100 Command Modes Interface Configuration Ethernet port channel mode Command Usage There are no user guidelines for this command Example The following example configures the MSTP instance 1 path cost for Ethernet port 1 e9 to 4 console config interface ethernet 1 e9 console config if spanning tree mst 1 cost 4 Related Commands spanning tree mst priority spanning tree mst max hops spanning tree mst port priority spanning tree mst configuration instance mst name mst revision mst show mst exit mst abort mst show spanning tree spanning tree mst configuration The spanning tree mst configuration Global Configuration mode command enables configuring an MST region by entering the Multiple Spanning Tree MST mode Syntax spanning tree mst configuration Default Setting This command has no default configuration Command Mode Global Configuration mode 4 487 4 Command Line Interface Command Usage All devices in an MST region must have the same VLAN mapping configuration revision number and name Example The following exam
150. 0 02 4101 Informational HAAA E AUTHFAIL Authentication failed for http source 10 6 39 20 2 2147469602 01 Jan 2000 01 50 12 Informational SAAAE AUTHFAIL Authentication failed for http source 10 6 39 16 J 2147480603 01 Jen 2000 01 65 55 Informatonal AAAE AUTHFAIL Authentication fated for http source 10 6 39 16 4 2147483604 01 Jan 2000 01 50 12 Informational INIT Starlup Warm Startup 5 2147489805 01 Jan 2000 015012 Informational SUNK Up gtd 6 2147483605 01 Jan 2000 01 50 12 Informational WLNK Up Vian 1 7 2147483607 01 Jan 2000 01 50 12 Informabonal SUNK W Oown qld O 2147483600 01 Jan 2000 01 50 12 Informational WUNKiUp 33 92147469609 01 Jan 2000 01 50 12 Informational LINK W Down WeoviewNMgmt W 21474810 O1Jan 2000 015012 14 2147483611 01 Jan 2000 01 50 12 42 2147483512 01K 43 214748313 01 44 2147483514 01 Jan 2000 01 50 12 45 2147489615 01 Jan 2000 01 50 12 16 2147463616 01 Jan 2000 01 50 12 2 Informational SUNK Informational LINK Informational LINK Informational LINK Informational SUNK W Oown g18 Informational UNK WDown g17 Informational SUNK W Oewn g16 472147469617 01 Jan 2000 01 50 12 _ Informational LINK W Oown 48 2147483618 01 Jan 2000 01 50 12 informational LINKW 49 2147483619 O1 Jan 2000 01 60 12 Informational LINK 20 2147483620 01 Jan 2000 01 50 12 Informational XLINK 29 21474836 01 Jan 2000 015012 Informabonal LUNK WOown q11 3 Figure 3 19 FLASH Logs Page
151. 0 303595962 357568 3289 7287 19 Jan 18 2002 21 57 30 287696304 275686 2789 5878 20 Console gt show rmon history 1 errors Sample Set 1 Owner Me Interface 1 el Interval 1800 4 441 4 Command Line Interface Requested samples 50 Time CRC Align Jan 18 2002 21 57 00 1 Jan 18 2002 21 57 30 aL Sample Set 1 Interface 1 el Requested samples 50 Maximum table size 500 Time Jan 18 2002 21 57 00 Jan 18 2002 21 57 30 Granted samples 50 Maximum table size 500 800 after reset Unders Oversiz Fragmen Jabbe ize e ts rs 1 0 49 0 1 0 27 0 Console gt show rmon history 1 other Owner Me Interval 1800 Granted samples 50 Droppe Collisi d ons 3 0 3 0 The following table describes significant fields shown above Field Description Time Date and Time the entry is recorded Octets The total number of octets of data including those in bad packets received on the network excluding framing bits but including FCS octets Packets The number of packets including bad packets received during this sampling interval Broadcast The number of good packets received during this sampling interval that were directed to the broadcast address Multicast The number of good packets received during this sampling interval that were directed to a multicast address This number does not include packets addressed to the broadcast address 4 442 RMON Commands 4
152. 00 the first eight bits of the IP address are ignored while the last eight bits are used Dest IP Address Matches the destination port IP address to which packets are addressed to the ACE Wildcard Mask Defines the destination IP address wildcard mask 3 123 B Configuring the Switch Match DSCP Matches the packet DSCP value to the ACE Either the DSCP value or the IP Precedence value is used to match packets to ACLs The possible field range is 0 63 Match IP Precedence Matches the packet IP Precedence value to the ACE Either the DSCP value or the IP Precedence value is used to match packets to ACLs The possible field range is 0 7 e Action The ACL forwarding action Possible values are Permit Forwards packets which meet the ACL criteria Deny Drops packets which meet the ACL criteria Shutdown Drops packet that meets the ACL criteria and disables the port to which the packet was addressed Ports are reactivated from the Interface Configuration Page Web Click Security Access Control IP Based ACL define the fields and click Apply IP Based ACL ACL Mame Remove ACL M act Mach Paiotiny Protocet Source Destination Match DSP ip Drecodence MMe Medify Remove IP Address Mask IP Address Mank rd c a Avot Figure 3 50 IP Based ACL Page CLI The following is an example of the IP Based ACLs CLI commands Console config ip access list ip acll 4 265 Console
153. 04 15 41 43 LINK 3 UPDOWN Interface Ethernet1 0 changed state to up Aug 2004 15 41 43 SLINK 3 UPDOWN Interface Ethernet1 1 changed state to up Aug 2004 15 41 43 LINK 3 UPDOWN Interface Ethernet1 2 changed state to up Aug 2004 15 41 43 LINK 3 UPDOWN Interface Ethernet1 3 changed state to up Aug 2004 15 41 43 SSYS 5 CONFIG_I Configured from memory by console Aug 2004 15 41 39 sLINEPROTO 5 UPDOWN Line protocol on Interface Aug 2004 15 41 39 sSLINEPROTO 5 UPDOWN Line protocol on Interface Ethernet1 0 changed state to down Aug 2004 15 41 39 sSLINEPROTO 5 UPDOWN Line protocol on Interface Ethernet1 1 changed state to down Aug 2004 15 41 39 LINEPROTO 5 UPDOWN Line protocol on Interface Ethernet1 2 changed state to down Aug 2004 15 41 39 SLINEPROTO 5 UPDOWN Line protocol on Interface Viewing the Device FLASH Logs The FLASH Logs Page contains all system logs in a chronological order that are saved in FLASH memory Command Attributes Log Index Displays the log number e Log Time Displays the time at which the log was generated e Severity Displays the log severity Description Displays the log message text 3 61 B Configuring the Switch Web Click System Logs Flash Logs Specify the FLASH Log Status salen Swi Si Logs Setirgs Memory E Remote Loos Sytem mynt Flash enta 5 Log index Log Time Severity Description 4 2147483601 01 J9n 200
154. 1 0 254 If your corporate network is connected to another network outside your office or to the Internet you need to apply for a registered IP address However if you are attached to an isolated network then you can use any IP address that matches the network segment to which you are attached After you configure the switch with an IP address you can open a Telnet session by performing these steps 1 From the remote host enter the Telnet command and the IP address of the device you want to access 2 Atthe prompt enter the user name and system password The CLI will display the Console prompt for the administrator to show that you are using privileged access mode i e Privileged Exec or Console for the guest to show that you are using normal access mode i e Normal Exec 3 Enter the necessary commands to complete your desired tasks 4 When finished exit the session with the quit or exit command After entering the Telnet command the login screen displays Username admin Password CLI session with the OmniStack 6200 24 is opened To end the CLI session enter Exit Console Note You can open up to four sessions to the device via Telnet 4 224 Entering Commands 4 Entering Commands This section describes how to enter CLI commands Keywords and Arguments A CLI command is a series of keywords and arguments Keywords identify a command and arguments specify configurat
155. 1 64 14 203 Related Commands ip domain lookup ip domain name ip name server ip host LACP Commands Table 4 16 LACP Commands Command Function Mode Page lacp system priority Configures the system priority To return to the default GC 4 371 configuration use the no form of this command lacp port priority Configures physical port priority To return to the default ICE 4 372 configuration use the no form of this command lacp timeout Assigns an administrative LACP timeout To return to the default ICE 4 373 configuration use the no form of this command show lacp ethernet Displays LACP information for Ethernet ports PE 4 373 show lacp Displays LACP information for a port channel PE 4 375 port channel lacp system priority The lacp system priority Global Configuration mode command configures the system priority To return to the default configuration use the no form of this command Syntax lacp system priority value no lacp system priority e value Specifies system priority value Range 1 65535 Default Setting The default system priority is 1 4 371 4 Command Line Interface Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example configures the system priority to 120 Console config lacp system priority 120 Related Commands show lacp port channel lacp port prio
156. 11 Octets The total number of packets including bad packets received that are between 256 and 511 octets in length inclusive excluding framing bits but including FCS octets 512 to 1023 The total number of packets including bad packets received that are between 512 Octets and 1023 octets in length inclusive excluding framing bits butincluding FCS octets 1024 to 1518 The total number of packets including bad packets received that are between 1024 Octets and 1518 octets in length inclusive excluding framing bits butincluding FCS octets Related Commands rmon collection history 4 438 RMON Commands 4 rmon collection history The rmon collection history Interface Configuration Ethernet port channel mode command enables a Remote Monitoring RMON MIB history statistics group on an interface To remove a specified RMON history statistics group use the no form of this command Syntax rmon collection history index owner ownername buckets bucket number interval seconds no rmon collection history index e index Specifies the statistics group index Range 1 65535 ownername Specifies the RMON statistics group owner name bucket number Number of buckets specified for the RMON collection history group of statistics If unspecified defaults to 50 Range 1 65535 seconds Number of seconds in each polling cycle Range 1 3600 Default Setting RMON statistics group owner name is an empty string
157. 15 sec Role PortFast Type e0 00 Forward Delay 15 sec 7a 00 Forward Delay 15 sec Interfaces Name State Prio Nbr 1 el Enabled 128 1 1 e2 Enabled 128 2 1 e4 Enabled 128 4 Spanning Tree Commands 4 Cost Sts Role PortFast Type 20000 FWD Root No P2p RSTP 20000 FWD Desg No Shared STP 20000 BLK ALTN No Shared STP console show spanning tree blockedports Spanning tree enabled mode RSTP Default port cost method long Root Priority ID Address Path Cost Root Port Hello Time 2 sec Brid Priority ge ID Address Hello Time 2 sec Interfaces Name State Prio Nbr 1 e4 Enabled 128 4 32768 00 01 42 97 e0 00 20000 1 1 1 Max Age 20 sec Forward Delay 15 sec 36864 00 02 4b 29 7a 00 Max Age 20 Forward Delay 15 sec sec Cost Sts Role PortFast Type 20000 BLK ALTN No Shared STP 4 499 4 Command Line Interface Default port cost method Root Priority ID Address Path Cost Root Port Hello Time 2 sec Brid Priority 36864 ge ID Address Hello Time 2 sec Designated bridge Priority Designated port id 128 25 BPDU sent 2 4 500 32768 received 120638 console show spanning tree detail Spanning tree enabled mode RSTP long 32768 00 01 42 97 e0 00 20000 1 1 el Max Age 20 sec Forward Delay 15 sec 00 02 4b 29 7a 00 Max Age 20 sec Forward Delay 15 sec Number of topology changes 2 last change occurred 2d18h ag
158. 2 el e4 10 VLANO010 e3 e4 1 VLAN001 el e2 20 VLANO020 e3 e4 2 VLANO02 30 VLANO030 3 VLANO03 9 VLANOO1 1 el e2 3978 Guest VLAN 1 e17 guest Authorization Required Required Required Required Required Required Required Not Required Related Commands vlan database vian name 4 580 VLAN Commands 4 show vlan internal usage The show vlan internal usage Privileged EXEC mode command displays a list of VLANs used internally by the device Syntax show vlan internal usage Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays VLANs used internally by the device console show vlan internal usage VLAN Usage IP address Reserved 1007 Eth 1 e21 Active No 1008 Eth 1 e22 Inactive Yes 1009 Eth 1 e23 Active Yes Related Commands ip internal usage vlan show interfaces switchport The show interfaces switchport Privileged EXEC mode command displays the switchport configuration Syntax show interfaces switchport ethernet interface port channel port channel number e interface A valid Ethernet port number e port channel number A valid port channel number Default Setting This command has no default configuration Command Mode Privileged EXEC mode 4 581 4 Command Line Interface Command Usage There are no user guidelines for thi
159. 2928 blocks 64 Are you sure Y N 2 Confirm by pressing lt Y gt The following message is displayed Enter First flash block 1 63 3 Enter the first flash block to be erased and press lt Enter gt The following message is displayed Enter Last flash block 1 63 2 29 20 Initial Configuration 4 Enter the last flash block to be erased and press lt Enter gt The following message is displayed Are you sure Y N 5 Confirm by pressing lt Y gt The following message is displayed Erasing flash blocks 1 63 Done Password Recovery If a password is lost use the Password Recovery option on the Startup menu The procedure enables the user to enter the device once without a password To recover a lost password for the local terminal only 1 From the Startup menu select 4 and press lt Enter gt The password is deleted 2 To ensure device security reconfigure passwords for applicable management methods 2 30 Chapter 3 Configuring the Switch Using the Web Interface This switch provides an embedded HTTP Web agent Using a Web browser you can configure the switch and view statistics to monitor network activity The Web agent can be accessed by any computer on the network using a standard Web browser Internet Explorer 5 0 or above or Netscape Navigator 6 2 or above Note You can also use the Command Line Interface CLI to manage the switch ov
160. 3 201 name server list 3 201 static entries 3 204 Domain Name Service 3 200 DSCP 3 176 3 185 Dynamic Host Configuration Protocol 3 48 E Enable 3 99 B Bandwidth assignments 3 177 Best effort 3 177 Best Effort service 3 176 BPDU 3 145 3 153 F Failure 3 36 Fast link 3 149 FCS 3 212 3 215 FCS error 3 212 3 215 FDB 3 126 3 127 Forwarding Database 3 126 3 127 Frame Check Sequence 3 212 3 215 G Gateway 3 46 Cc CIR 3 177 3 180 Class of Service 3 174 CLI 3 36 CLI showing commands 4 226 Command Line Interface 3 36 command line interface See CLI Committed Burst Siz 3 180 Committed Information Rate 3 177 3 180 CoS 3 174 D default settings system 1 7 DHCP 3 48 H HMAC MD5 96 3 82 HMAC SHA 96 3 82 HTTP 3 175 l IDRP 3 123 IEEE 802 1D 3 145 IEEE 802 1w 3 145 Inter Domain Routing Protocol 3 123 IP addresses 3 46 L L2IP 3 123 LACP 3 130 Layer 2 Internet Protocol 3 123 LCP 3 151 Line 3 99 Index 617 Index Link Aggregation Control Protocol 3 130 Link Control Protocol 3 151 log in Web interface 3 31 logon authentication TACACS client 3 94 TACACS server 3 94 M MAC addresses 3 105 main menu 3 33 Management Access Lists 3 93 Management Information Bases MIBs A 607 MDI 1 6 MDIX 1 6 Minimum delay 3 177 multicast filtering 3 192 N NCP 3 151 Network Control Protocols 3 151 None 3 177 o Open Shortest Path First 3 123
161. 3 View local engine ID of device is comprised of IANA Private Enterprise number amp MAC address of device 1 7 1 Introduction Table 1 2 System Defaults Function Parameter Default Port Configuration Admin Status enabled Auto negotiation on Flow Control off Port Capability list of all capabilities on port AMAP Status enabled Common Phase Timeout Interval 300 sec Discovery Phase Timeout Interval 30 sec Rate Limiting Input and output limits disabled Port Trunking Static Trunks up to 8 port in 8 trunks can be defined LACP system priority 1 LACP Port priority 1 LACP long Broadcast Storm Status disabled a Broadcast Limit Rate 100 kbps Spanning Tree Status enabled ds Spanning Tree Mode STP Fast Forwarding Edge Port enabled Address Table Aging Time 300 seconds Virtual LANs Default VLAN 1 PVID 1 Acceptable Frame Type all Ingress Filtering on Switchport Mode Egress Mode hybrid tagged untagged GVRP global disabled GVRP port interface disabled Quality of Service QoS Mode disabled CoS Mapping Cos 0 queue 1 CoS 1 queue 1 Cos 2 queue 1 Cos 3 queue 1 CoS 4 queue 2 Cos 5 queue 2 Cos 6 queue 3 CoS 7 queue 3 Scheduling all queues are expedite queues 1 8 System Defaults 1 Table 1 2 System Defaults
162. 5 e type Specifies the type of notification generated by the device about this event Possible values none log trap log trap e community text If the specified notification type is trap an SNMP trap is sent to the SNMP community specified by this octet string Range 0 127 characters description text Specifies a comment describing this event Range 0 127 characters name Specifies the name of the person who configured this event If unspecified the name is an empty string Default Setting This command has no default configuration Command Mode Global Configuration mode 4 447 4 Command Line Interface Command Usage If log is specified as the notification type an entry is made in the log table for each event If trap is specified an SNMP trap is sent to one or more management stations Example The following example configures an event identified as index 10 and for which the device generates a notification in the log table Console config rmon event 10 log Related Commands show rmon events show rmon events The show rmon events User EXEC mode command displays the RMON event table Syntax show rmon events Default Setting This command has no default configuration Command Mode User EXEC mode Command Usage There are no user guidelines for this command Community device Owner CLI Example The following example displays the RMON event table Console
163. 5 3 System Contact Robert System Location Marketing The following table describes significant fields shown above Field Description Community string Community access string to permit access to the SNMP protocol Community access Type of access read only read write super access IP Address Management station IP Address Version SNMP version for the senttrap 1 or 2 Related Commands snmp server community snmp server group snmp server user show snmp engineid The show snmp engineid Privileged EXEC mode command displays the ID of the local Simple Network Management Protocol SNMP engine Syntax show snmp engineid Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays the SNMP engine ID console show snmp engineid Local SNMP engineid 08009009020C0B099C075878 4 466 SNMP Commands 4 Related Commands snmp server engineid local show snmp views The show snmp views privileged EXEC mode command displays the configuration of views Syntax show snmp views viewname viewname Specifies the name of the view Range 1 30 Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays the configuration of vi
164. 529 the internal buffer show logging file Displays the state of logging and the syslog messages stored in PE 4 531 the logging file show Displays the settings of the syslog servers PE 4 532 logging on The logging on Global Configuration mode command controls error message logging This command sends debug or error messages to a logging process which logs messages to designated locations asynchronously to the process that 4 521 4 Command Line Interface generated the messages To disable the logging process use the no form of this command Syntax logging on no logging on Default Setting Logging is enabled Command Mode Global Configuration mode Command Usage The logging process controls the distribution of logging messages at various destinations such as the logging buffer logging file or syslog server Logging on and off at these destinations can be individually configured using the logging buffered logging file and logging Global Configuration mode commands However if the logging on command is disabled no messages are sent to these destinations Only the console receives messages Example The following example enables logging error messages console config logging on Related Commands show logging show syslog servers logging The logging Global Configuration mode command logs messages to a syslog server To delete the syslog server with the specified address from the list of s
165. 6 console config interface ethernet 1 e16 console config if switchport trunk allowed vlan add 1 2 5 6 Related Commands switchport mode switchport access vlan switchport trunk native vian switchport general allowed vian switchport general pvid switchport general ingress filtering disable switchport general acceptable frame type tagged only switchport forbidden vian show interfaces switchport switchport access multicast tv vlan switchport trunk native vlan The switchport trunk native vian Interface Configuration mode command defines the native VLAN when the interface is in trunk mode To return to the default configuration use the no form of this command Syntax switchport trunk native vlan vian id no switchport trunk native vian e vian id Specifies the ID of the native VLAN Default Setting VID 1 Command Mode Interface Configuration Ethernet port channel mode 4 572 VLAN Commands 4 Command Usage The command adds the port as a member in the VLAN If the port is already a member in the VLAN not as a native it should be first removed from the VLAN Example The following example configures VLAN number 123 as the native VLAN when Ethernet port 1 e16 is in trunk mode console config interface ethernet 1 e16 console config if switchport trunk native vlan 123 Related Commands switchport mode switchport access vlan switchport trunk allowed vlan switchport genera
166. 6 66 to port 1 e1 Console config interface ethernet 1 el Console config if port security routed secure address 66 66 66 66 66 66 Related Commands show ports security addresses show bridge address table The show bridge address table Privileged EXEC mode command displays all entries in the bridge forwarding database Syntax show bridge address table vlan vian ethernet interface port channel port channel number e vian Specifies a valid VLAN such as VLAN 1 e interface A valid Ethernet port port channel number A valid port channel number 4 287 4 Command Line Interface Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage Internal usage VLANs VLANs that are automatically allocated on ports with a defined Layer 3 interface are presented in the VLAN column by a port number and not by a VLAN ID Special MAC addresses that were not statically defined or dynamically learned are displayed in the MAC address table This includes for example MAC addresses defined in ACLs Example The following example displays all classes of entries in the bridge forwarding database Console show bridge address table Aging time is 300 sec interface mac address Port Type 1 00 60 70 4C 73 FF 5 e8 dynamic 1 00 60 70 8C 73 FF 5 e8 dynamic 200 00 10 0D 48 37 FF 5 e9 static Related Commands bridge address clear bridge bridge agi
167. 63 Default Setting The default map is the Null map which means that each incoming DSCP value is mapped to the same DSCP value Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example changes DSCP values 1 2 4 5 and 6 to DSCP mutation map value 63 Console config qos map dscp mutation 1 2 4 5 6 to 63 Related Commands qos dscp mutation Radius Commands Table 4 24 Radius Commands Command Function Mode Page radius server host Specifies a RADIUS server host To delete the specified RADIUS GC 4 430 host use the no form of this command radius server key Sets the authentication and encryption key for all RADIUS GC 4 431 communications between the device and the RADIUS daemon To return to the default configuration use the no form of this command radius server Specifies the number of times the software searches the listof GC 4 432 retransmit RADIUS server hosts To reset the default configuration use the no form of this command radius server Specifies the source IP address used for communication with GC 4 433 source ip RADIUS servers To return to the default configuration use the no form of this command radius server Sets the interval during which the device waits fora server hostto GC 4 433 timeout reply To return to the default configuration use the no form of this command 4
168. 8 Default Setting This command has no default configuration Command Mode User EXEC mode Command Usage Example The following example displays stack status console gt show stack Unit Address Software Master Uplink Downlink Status 4 Command Line Interface 1 00 00 b0 87 12 11 1 0 0 0 Enabled 2 3 Slave 2 00 00 b0 87 12 13 1 0 0 0 Enabled HE 4 Master 4 00 00 b0 87 12 14 1 0 0 0 3 5 Slave 5 00 00 b0 87 12 15 1 0 0 0 4 6 Slave 6 00 00 b0 87 12 16 10 00 5 7 Slave Configured order Unit 1 at Top Unit 2 at bottom console gt show stack Unit Address Software Master Uplink Downlink Status 3 00 00 b0 87 12 13 0 0 0 1 4 Slave 4 00 00 b0 87 12 14 0 0 0 3 5 Slave 5 00 00 b0 87 12 15 30 30 20 4 6 Slave 6 00 00 b0 87 12 16 0 0 0 5 2 Slave 1 00 00 b0 87 12 12 0 0 0 Forced 6 1 Master 2 00 00 b0 87 12 11 0 0 0 Enabled 2 3 Slave Configured order Unit 1 at Top Unit 6 at bottom Can t display order as requested console gt show stack unit 1 Unit 1 MAC address 00 00 b0 87 12 11 Master Forced Product OS LS 6224 Software 1 0 0 0 Status Master Active image image 1 Selected for next boot image 2 Related Commands stack master stack reload stack display order 4 546 System Management Commands 4 show users The show users User EXEC mode command displays information about the active users Syntax show users Default Setting This command has no default configuration
169. A4YcF6zMzaTlwefWwx6f Rmt 5nhhqdAtN 4oJ ce166DqVx1gWmN ZNR4DYDvSzg01DnwCAC8Qh Fingerprint a4 16 46 23 5a 8d 1d b5 37 59 eb 44 13 b9 33 e9 console console console console config crypto key pubkey chain ssh config pubkey chain user key bob rsa config pubkey key key string row AAAAB3Nza config pubkey key key string row Clyc2 Related Commands crypto key generate dsa crypto key generate rsa ip ssh pubkey auth crypto key pubkey chain ssh user key show crypto key mypubkey show crypto key pubkey chain ssh show ip ssh The show ip ssh Privileged EXEC mode command displays the SSH server configuration Syntax show ip ssh 4 517 4 Command Line Interface Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays the SSH server configuration console show ip ssh SSH server enabled Port 22 RSA key was generated DSA DSS key was generated SSH Public Key Authentication is enabled Active incoming sessions IP address SSH Version Cipher Auth Code username 172 16 2002 John Brown 2 0 3 DES HMAC SHA1 The following table describes significant fields shown above Field Description IP address Client address SSH username User name Version SSH version number Cipher Encryption type 3DES Blowfish RC4 Auth Code Authent
170. AC Address 00 00 00 00 00 00 Oper Key 14 Related Commands lacp system priority lacp port priority lacp timeout show lacp ethernet 4 376 Line Commands 4 Line Commands Table 4 17 Line Commands Command Function Mode Page line Identifies a specific line for configuration and enters the Line GC 4 377 Configuration command mode speed Sets the line baud rate To return to the default configuration use LC 4 378 the no form of the command autobaud Sets the line for automatic baud rate detection autobaud To LC 4 378 disable automatic baud rate detection use the no form of the command exec timeout Sets the interval that the system waits until user inputis detected LC 4 379 To return to the default configuration use the no form of this command history Enables the command history function To disable the command LC 4 380 history function use the no form of this command history size Configures the command history buffer size for a particular line To LC 4 380 resetthe command history buffer size to the default configuration use the no form of this command terminal history Enables the command history function for the current terminal UE 4 381 session To disable the command history function use the no form of this command terminal history size Configures the command history buffer size for the current UE 4 382 terminal session To reset the command history buffer
171. Alcatel OS 6200 User Guide An Alcatel service agreement brings your company the assurance of 7x24 no excuses technical support You ll also receive regular software updates to maintain and maximize your Alcatel product s features and functionality and on site hardware replacement through our global network of highly qualified service delivery partners Additionally with 24 hour a day access to Alcatel s Service and Support web page you ll be able to view and update any case open or closed that you have reported to Alcatel s technical support open a new case or access helpful release notes technical bulletins and manuals For more information on Alcatel s Service Programs see our web page at www ind alcatel com call us at 1 800 995 2696 or email us at support ind alcatel com This Manual documents Alcatel 6200 hardware and software The functionality described in this Manual is subject to change without notice Copyright 2005 by Alcatel Internetworking Inc All rights reserved This document may not be reproduced in whole or in part without the express written permission of Alcatel Internetworking Inc Alcatel and the Alcatel logo are registered trademarks of Compagnie Financi re Alcatel Paris France OmniSwitch and OmniStack are registered trademarks of Alcatel Internetworking Inc Omni Switch Router SwitchExpert the Xylan logo are trademarks of Alcatel Internetworking Inc All other brand and product names
172. Attributes MAC Address Displays the MAC address to which the entry refers e VLAN ID Displays the VLAN ID number to which the entry refers e Interface Displays the interface to which the entry refers e Port The specific port number to which the forwarding database parameters refer e LAG The specific LAG number to which the forwarding database parameters refer e Status Displays how the entry was created The possible field values are e Secure The MAC Address is defined for locked ports e Permanent The MAC address is permanent Delete on Reset The MAC address is deleted when the device is reset Delete on Timeout The MAC address is deleted when a timeout occurs e Remove Removes the entry The possible field values are Checked Removes the selected entry e Unchecked Maintains the current static forwarding database Web Click Layer 2 Address Table Static Addresses Specify the interface the MAC address and VLAN then click Apply 3 142 Defining the Forwarding Database 3 Static Addresses Aare memes VLAN AD MAC Address tmtestace Windes Status Modify Remove 4 Cc Figure 3 61 Forwarding Database Static Addresses Page CLI The following is an example of the CLI commands used to define static addresses Console config interface vlan 2 4 567 Console config if bridge address 3aa2 64b3 a245 ethernet 1 e16 permanent 4 277 Defining Dynami
173. CLI The following is an example of the CLI commands used to display FLASH logs console show logging file 4 533 Logging is enabled Console Logging Level info Console Messages 0 Dropped Buffer Logging Level info Buffer Messages 62 Logged 62 Displayed 200 Max File Logging Level debug File Messages 11 Logged 51 Dropped SysLog server 12 1 1 2 Logging warning Messages 14 Dropped SysLog server 1 1 1 1 Logging info Messages 0 Dropped 01 Jan 2000 01 12 01 COPY W TRAP The copy operation was completed successfully 01 Jan 2000 01 11 49 LINK I Up 1 e11 01 Jan 2000 01 11 46 LINK I Up 1 e12 01 Jan 2000 01 11 42 LINK W Down 1 e13 Remote Log Configuration The Remote Log Page allows you to configure the logging of messages that are sent to syslog servers or other management stations You can also limit the event messages sent to only those messages at or above a specified level Command Attributes Server Specifies the server to which logs can be sent UDP Port Defines the UDP port to which the server logs are sent The possible range is 1 65535 The default value is 514 e Facility Defines an application from which system logs are sent to the remote server Only one facility can be assigned to a single server If a second facility level 3 62 Copying Files 3 is assigned the first facility is overridden All applications defined for a device utilize the same facility on a
174. Commands 4 If the public key found in the certificate does not match the device s SSL RSA key the command fails This command is not saved in the device configuration however the certificate imported by this command is saved in the private configuration which is never displayed to the user or backed up to another device Examples The following example imports a certificate signed by Certification Authority for HTTPS console config crypto certificate 1 import Saat BEGIN CERTIFICATE dHmUgUm9vdCBDZXJ 0aWZpZXIwXDANBgkqhkiG9w0 BAQEFAANLADBIAkEAp4HS nnH xQSGA2 f kRBwU2XIxb7n8VPsTmlxyJ1t1llalGaqchfMqqe0kmfhcoHSswr yf 1FpDOMWOTgDAWIDAQABo4 IBoj CCAZ4wEwYJKwYBBAGCNxQCBAYeBABDAEEw CwRO0 PBAQDAgFGMA8GA1UdEWEB wOFMAMBAf 8wHQYDVROOBBYEFAf 4MT9BRD47 ZVKBAEL9Ggp 6MI IBNgGYDVROfBIIBLTCCASkwgdKggc ggcyGgclsZGFwOi 8v LOVByb3h5JdTIwU2 9mdHdhcmU1Mj BSb2 900 TI wQ2VydGlmaWVyLENOPXN1cnZ1 Sea END CERTIFICATE Certificate imported successfully Issued to router gm com Issued by www verisign com Valid from 8 9 2003 to 8 9 2004 Subject CN router gm com 0 General Motors C US Finger print DC789788 DC88A988 127897BC BB789788 Related Commands crypto certificate generate crypto certificate request ip https certificate show crypto certificate mycertificate ip https certificate The ip https certificate Global Configuration mode command configures the active certificate for HTTPS To return to the default con
175. Configuration Page CLI The following is an example of the IGMP CLI commands console config bridge multicast filtering 4 278 console config ip igmp snooping 4 352 4 352 3 193 B Configuring the Switch Displaying Interfaces Attached to a Multicast Router The Bridge Multicast Forward All Page contains fields for attaching ports or LAGs to a device that is attached to a neighboring Multicast router switch Once IGMP Snooping is enabled Multicast packets are forwarded to the appropriate port or VLAN Unless LAGs are defined only a Multicast Forward All table displays The following table summarizes the Multicast settings which can be assigned to ports in the Multicast Forward All Page Table 1 Bridge Multicast Forward All Router Port Control Settings Table Port Control Definition D Attaches the port to the Multicast router or switch as a dynamic port S Attaches the port to the Multicast router or switch as a static port F Forbidden N The portis not attached to a Multicast router or switch Command Attributes e VLAN ID Displays the VLAN for which Multicast parameters are displayed e Ports Ports that can be added to a Multicast service Web Click Multicast Bridge Multicast Multicast Forward All Select the required VLAN ID from the scroll down list to display the associated multicast routers 3 194 Multicast Filtering 3 gt a C z Multicast Forward All
176. D and password for authentication IEEE 802 3ac Defines frame extensions for VLAN tagging Glossary 612 Glossary IEEE 802 3x Defines Ethernet frame start stop requests and timers used for flow control on full duplex links IGMP Snooping Listening to IGMP Query and IGMP Report packets transferred between IP Multicast Routers and IP Multicast host groups to identify IP Multicast group members IGMP Query On each subnetwork one IGMP capable device will act as the querier that is the device that asks all hosts to report on the IP multicast groups they wish to join or to which they already belong The elected querier will be the device with the lowest IP address in the subnetwork Internet Group Management Protocol IGMP A protocol through which hosts can register with their local router for multicast services If there is more than one multicast switch router on a given subnetwork one of the devices is made the querier and assumes responsibility for keeping track of group membership In Band Management Management of the network from a station attached directly to the network IP Multicast Filtering A process whereby this switch can pass multicast traffic along to participating hosts IP Precedence The Type of Service ToS octet in the IPv4 header includes three precedence bits defining eight different priority levels ranging from highest priority for network control packets to lowest priority for routine tra
177. ECL E PEP EET VEEP E PEEP PPE ETE EET PEPE RET ETOP eT PET senna ea ee Copy took 0 01 11 hh mm ss 3 53 B Configuring the Switch Uploading System Files The Flle Upload Page contains fields for uploading the software from the device to the TFTP server Firmware Upload Specifies that the software image file is uploaded If Firmware Upload is selected the Configuration Upload fields are grayed out Configuration Upload Specifies that the Configuration file is uploaded If Configuration Upload is selected the Software Image Upload fields are grayed out Software TFTP Server IP Address Specifies the TFTP Server IP Address to which the Software Image is uploaded Software Destination File Name Specifies the software image file path to which the file is uploaded Configuration TFTP Server IP Address Specifies the TFTP Server IP Address to which the Configuration file is uploaded Configuration Destination File Name Specifies the file name to which the Startup Configuration file is uploaded Configuration Transfer file name Specifies the Configuration file name that is uploaded The possible field values are e Running Configuration Uploads the Running Configuration file e Startup Configuration Uploads the Startup Configuration file Web Click System Mgmt File Management File Upload Define the fields Click Apply File Upload Firmware Upload Configuration Upload Meter t
178. EE E EE A E EEE EE EEE EA EA E E EE EE EEr EREE EENE L Copy took 00 01 11 hh mm ss Exclamation symbols indicate that a copying process is in progress A period indicates that the copying process is timed out Many periods in a row indicate that the copying process failed 6 Select the image for the next boot by entering the boot system command After this command enter the command show bootvar to verify that the copy indicated as a parameter in the boot system command is selected for the next boot The following is an example of the information that appears Console boot system image 2 4 319 Console show bootvar 4 321 Images currently available on the Flash Image l active Image 2 not active selected for next boot If the image for the next boot is not selected by entering the boot system command the system boots from the currently active image image 1 as given in the example 7 Enter the command reload The following message is displayed Console reload 4 541 This command will reset the whole system and disconnect your current session Do you want to continue y n n 8 Enter Y to reboot the switch Boot Image Download Loading a new boot image from the TFTP server and programming it into the flash updates the boot image The boot image is loaded when the switch is powered on To download a boot file through the TFTP server 1 Ensure that an IP address is configured on one o
179. EE ORA PASS Boot Checksum Tese ir esis doe Eoaea sere eves eee E PASS Flash Image Validation Test serceru is spe cede sign siasmee PASS BOOT Software Version x x x xx Built 07 Jan 200x 10 53 05 Processor XXXXXX XXXXX XXXX XX MByte SDRAM I Cache 8 KB D Cache 8 KB Cache Enabled Autoboot in 2 seconds press RETURN or Esc to abort and enter prom The boot process runs approximately 30 seconds The auto boot message that appears at the end of POST see the last lines indicates that no problems were encountered during boot During boot the Startup menu can be accessed if necessary to run special procedures To enter the Startup menu press lt Esc gt or lt Enter gt within the first two seconds after the auto boot message is displayed For information on the Startup menu see Startup Menu Functions If the system boot is not interrupted by pressing lt Esc gt or lt Enter gt the system continues operation by decompressing and loading the code into RAM The code starts running from RAM and the list of numbered system ports and their states up or down are displayed 2 15 20 Initial Configuration Note The following screen is an example configuration Items such as addresses versions and dates may differ for each device Preparing to decompress Decompressing SW from image 1 638000 OK Running from RAM RK RK KR KR RK k k k k k k k k KR KR KR KK k k k k k k k k k k k k k k k k k k k k k k
180. Example The following example displays traffic seen by the physical interface Console show interfaces counters Port InOctets InUcastPkts InMcastPkts InBcastPkts 1 el 183892 0 0 0 2 el 0 o 0 o 3 e1 123899 0 0 0 Port OutOctets OutUcastPkts OutMcastPkts OutBcastPkts 1 e1 9188 0 0 0 2 el 0 o 0 o 3 e1 8789 0 0 0 Ch InOctets InUcastPkts InMcastPkts InBcastPkts 1 27889 0 0 0 4 338 Ethernet Configuration Commands 4 Ch OutOctets OutUcastPkts OutMcastPkts OutBcastPkts The following example displays counters for Ethernet port 1 e1 Console show interfaces counters ethernet 1 el Port InOctets InUcastPkts InMcastPkts InBcastPkts Jel 183892 0 0 0 Port OutOctets OutUcastPkts OutMcastPkts OutBcastPkts Jel 9188 0 0 0 FCS Errors 8 Single Collision Frames 0 Late Collisions 0 Oversize Packets 0 Internal MAC Rx Errors 0 Symbol Errors 0 Received Pause Frames 0 Transmitted Pause Frames 0 4 339 4 Command Line Interface The following table describes the fields shown in the display Field Description InO ctets Counted received octets InUcastP kts Counted received unicast packets InMcastP kts Counted received multicast packets InBcastP kts Counted received broadcast packets OutOctets Counted transmitted octets OutUcastP kts Counted transmitted unicast packets OutMcastP kts Counted transmitted multicast packets OutBcastP kts Counted transmitted bro
181. I commands Console show vlan multicast tv vlan 1000 Source ports Receiver Ports 1 8 1 9 2 1 18 3 1 18 4 1 18 Configuring Domain Name Service Domain Name System DNS converts user defined domain names into IP addresses Each time a domain name is assigned the DNS service translates the name into a numeric IP address For example www ipexample com is translated into 192 87 56 2 DNS servers maintain databases of domain names and their corresponding IP addresses When a client device designates this switch as a DNS server the client will attempt to resolve host names into IP addresses by forwarding DNS queries to the switch and waiting for a response You can manually configure entries in the DNS table used for mapping domain names to IP addresses configure default domain names or specify one or more name servers to use for domain name to address translation When configuring the DNS parameters e Enable DNS service on this switch first configure one or more name servers and then enable domain lookup status To append domain names to incomplete host names received from a DNS client i e not formatted with dotted notation you can specify a default domain name or a list of domain names to be tried in sequential order e lIfthere is no domain list the default domain name is used If there is a domain list the default domain name is not used When an incomplete host name is received by the DNS server on
182. Interface dot1x timeout supp timeout dot1x timeout server timeout show dot1x show dot1x statistics The show dot1x statistics Privileged EXEC mode command displays 802 1X statistics for the specified interface Syntax show dot1x statistics ethernet interface interface Valid Ethernet port Full syntax unit port Default Configuration This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays 802 1X statistics for the specified interface Console show dotlx statistics ethernet 1 el EapolFramesRx 11 EapolFramesTx 12 EapolStartFramesRx 12 EapolLogoffFramesRx 1 EapolRespIdFramesRx 3 EapolRespFramesRx 6 EapolReqIidFramesTx 3 EapolReqFramesTx 6 InvalidEapolFramesRx 0 EapLengthErrorFramesRx 0 LastEapolFrameVersion 1 LastEapolFrameSource 00 08 78 32 98 78 4 248 802 1x Commands 4 The following table describes the significant fields shown in the display Field Description EapolF ramesR x The number of valid EAPOL frames of any type thathave been received by this Authenticator EapolF ramesTx The number of EAPOL frames of any type that have been transmitted by this Authenticator EapolS tartF ramesR x The number of EAPOL Start frames that have been received by this Authenticator EapolLogoffF ramesR x The nu
183. MAC based classification rule Example The following example sets a mac based classification rule console config vlan database console config vlan map mac 00 08 78 32 98 78 9 macs group 1 interface ethernet e17 console config vlan exit console config interface ethernet 1 e17 console config if switchport mode general console config if switchport general map macs group 1 vlan 2 Related Commands switchport mode map mac macs group 4 588 VLAN Commands 4 switchport general map subnets group vian The switchport general map subnets group vlan Interface Configuration mode command sets a subnet based classification rule To delete a classification use the no form of the command Syntax switchport general map subnets group group vlan vian id no switchport general map subnets group group group Specifies the group number e vian id Defines the VLAN ID that is associated with the rule Default Setting This command has no default configuration Command Mode Interface Configuration Ethernet port channel Command Usage MAC based VLAN rules cannot contain overlapping ranges on the same interface The priority between VLAN classification rules is e MAC based VLAN Best match between the rules e Subnet based VLAN Best match between the rules e Protocol based VLAN PVID Interface mode must be general prior to defining Subnet based Classification Example The following exa
184. MIwTCCASoCAQAwYj ELMAkGA1UEBhMCUFAxCzAJBgNVBAgGTAKNDMQswCQYDVQQH EwRDEMMAOoGA1UEChMDZGxkMQwwCgYDVQQLEWNkKbGOxCzAJBgNVBAMTAmxkMRAWwW DgKoZIhvcNAQkBFgFsMIG MANGCSqGS 1b3 DOEBAQUAA4GNADCBiQKBgOC8ecwO HdML0831i0 h FOMV Kib6Sz5p 3nUUenbfHp igVPmFM 1nbqTDekb2ymCu6K aKvEbVLF9F2LmM7VPjDBb9bb4 jnxkvwW wzDLvW2rsy5NPmH10V1 8Ubx3GyCm OW93BSOFwxwEsP58kf sPYPy 8wwmoNt DwIDAQABoB8wHQYJKoZIhvcNAQkH MRDj EyMwgICCAgICAICAgIMA0GCSgGS Ib3 DOEBBAUAA4GBAGb8UgIx7rB05m 2 m5ZZPhIwl 8ARSPXwhVdJexFj bnmvcacqj PG8pliRV6 LkxryGF2bVU3j KEipcZa g uNpyTkDt3ZVU72pjz fa8TFOn3 Some END CERTIFICATE REQUEST CN router gm com 0 General Motors C US Related Commands crypto certificate generate crypto certificate import ip https certificate show crypto certificate mycertificate crypto certificate import The crypto certificate import Global Configuration mode command imports a certificate signed by the Certification Authority for HTTPS Syntax crypto certificate number import number Specifies the certificate number Range 1 2 Default Setting This command has no default configuration Command Mode Global Configuration mode Command Usage Use this command to enter an external certificate signed by Certification Authority to the device To end the session enter an empty line The imported certificate must be based on a certificate request created by the crypto certificate request Privileged EXEC mode command 4 600 Web Server
185. N group ports can either be attached to a VLAN ID or a VLAN name The possible field range is 1 4095 Web Click VLAN VLAN Groups Mapping Groups to VLAN Groups Define the fields and click Apply Tey 3 TE WebView Mapping Groups to VLAN Growp Type Sereas E Intertace Group ID VLAN ID Modify Remove a o Figure 3 75 Mapping Groups to VLAN Page 3 167 B Configuring the Switch CLI The following is an example of the CLI commands used to map interfaces to VLAN groups switchport general map macs group vlan 4 590 switchport general map subnets group vlan 4 591 3 168 Configuring VLANs 3 Defining GARP Generic Attribute Registration Protocol GARP protocol is a general purpose protocol that registers any network connectivity or membership style information GARP defines a set of devices interested in a given network attribute such as VLAN or multicast address When configuring GARP ensure the following The leave time must be greater than or equal to three times the join time The leave all time must be greater than the leave time Set the same GARP timer values on all Layer 2 connected devices If the GARP timers are set differently on the Layer 2 connected devices the GARP application does not operate successfully The GARP Page contains parameters for defining network atrributes such as VLAN or multicast addresses Command Attributes Copy from Entry Number Indicates the row numb
186. P RFC 826 DHCP RFC 1541 HTTPS IGMP RFC 1112 IGMPv2 RFC 2236 RADIUS RFC 2618 RMON RFC 1757 groups 1 2 3 9 SNMP RFC 1157 SNTP RFC 2030 SNMPv2 RFC 1907 SSH Version 2 0 TFTP RFC 1350 Management Information Bases Bridge MIB RFC 1493 Entity MIB RFC 2737 Ether like MIB RFC 2665 Extended Bridge MIB RFC 2674 Extensible SNMP Agents MIB RFC 2742 Forwarding Table MIB RFC 2096 IGMP MIB RFC 2933 Interface Group MIB RFC 2233 Interfaces Evolution MIB RFC 2863 IP Multicasting related MIBs MAU MIB RFC 2668 MIB II RFC 1212 1213 Port Access Entity MIB IEEE 802 1x Private MIB Quality of Service MIB RADIUS Authentication Client MIB RFC 2621 RMON MIB RFC 2819 RMON II Probe Configuration Group RFC 2021 partial implementation SNMP framework MIB RFC 2571 SNMP MPD MIB RFC 2572 SNMP Target MIB SNMP Notification MIB RFC 2573 SNMP User Based SM MIB RFC 2574 SNMP View Based ACM MIB RFC 2575 SNMP Community MIB RFC 2576 TACACS Authentication Client MIB TCP MIB RFC 2013 Trap RFC 1215 607 UDP MIB RFC 2012 608 APPENDIX B TROUBLESHOOTING Problems Accessing the Management Interface Table B 35 Troubleshooting Chart Symptom Action Cannot connectusing Telnet Web browser or SNMP software Be sure the switch is powered up Check network cabling between the management station and the switch Check that you have a vali
187. P anycastclient GC 4 307 enable use the no form of this command sntp clientenable Enables the Simple Network Time Protocol SNTP clienton an IC 4 308 Interface interface This applies to both receive broadcast and anycast updates To disable the SNTP client use the no form of this command sntp unicast client Enables the device to use the Simple Network Time Protocol GC 4 309 enable SNTP to request and accept SNTP traffic from spedified unicast servers To disable requesting and accepting SNTP traffic from servers use the no form of this command sntp unicast client Enables polling for the Simple Network Time Protocol SNTP GC 4 310 poll predefined unicast servers To disable the polling for SNTP client use the no form of this command sntp server Configures the device to use the Simple Network Time Protocol GC 4 310 SNTP to request and accept SNTP traffic from a specified server To remove a server from the list of SNTP servers use the no form of this command show clock Displays the time and date from the system clock UE 4 311 show sntp Shows the configuration of the Simple Network Time Protocol PE 4 312 configuration SNTP show sntp status Shows the status of the Simple Network Time Protocol SNTP PE 4 314 clock set The clock set Privileged EXEC mode command manually sets the system clock Syntax clock set hh mm ss day month year or clock set hh mm ss month day year 4 299 4 Command Line Inter
188. Port number to be used by the HTTP server Range 0 65535 Default Setting The default port number is 443 Command Mode Global Configuration mode Command Usage Specifying O as the port number effectively disables HTTPS access to the device Example The following example configures the https port number to 100 console config ip https port 100 4 597 4 Command Line Interface Related Commands ip https server ip https certificate show ip https crypto certificate generate The crypto certificate generate Global Configuration mode command generates a self signed HTTPS certificate Syntax crypto certificate number generate key generate ength cn common name ou organization unifl or organization loc location st state cu country duration days number Specifies the certificate number Range 1 2 key generate Regenerate the SSL RSA key length Specifies the SSL RSA key length Range 512 2048 common name Specifies the fully qualified URL or IP address of the device Range 1 64 organization Specifies the organization name Range 1 64 organization unit Specifies the organization unit or department name Range 1 64 location Specifies the location or city name Range 1 64 state Specifies the state or province name Range 1 64 country Specifies the country name Range 2 2 days Specifies number of days certificat
189. Privileged EXEC mode command displays autonegotiation data Syntax show interfaces advertise ethernet interface port channel port channel number interface Valid Ethernet port Full syntax unit port port channel number Valid port channel number Default Setting This command has no default configuration 4 332 Ethernet Configuration Commands 4 Command Modes Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays autonegotiation information Console show interfaces advertise Port Type Neg Operational Link Advertisement el 00M Copper Enabled e2 00M Copper Enabled e3 00M Copper Enabled e4 00M Copper Enabled e5 00M Copper Enabled 100f 100h 10f 10h e6 00M Copper Enabled e7 00M Copper Enabled e8 00M Copper Enabled e9 00M Copper Enabled g eip 00M Copper Enabled ell 00M Copper Enabled e12 00M Copper Enabled e13 00M Copper Enabled e14 00M Copper Enabled e15 00M Copper Enabled e16 00M Copper Enabled 17 00M Copper Enabled e18 00M Copper Enabled e19 00M Copper Enabled e20 00M Copper Enabled Related Commands negotiation 4 333 4 Command Line Interface show interfaces configuration The show interfaces configuration Privileged EXEC mode command displays the configuration for all configured interfaces Syntax show interfaces configuration ethernet interface
190. QoS DSCP Rewriting Settings The DSCP Rewrite Page allows network administrators to rewrite DSCP values Command Attributes e DSCP In DSCP tag on an incoming packet e DSCP Out DSCP tag on outgoing packets Web Click Policy Basic Mode DSCP Rewrite define the fields and click Apply 3 184 Configuring Quality of Service 3 DSCP Rewrite SCP in OSCP Owe dddddddddddddddo dul a Figure 3 85 DSCP Rewrite Page CLI The following is an example of the CLI commands used to rewrite DSCP values Console config qos dscp mutation 4 428 Defining QoS DSCP Mapping Settings When traffic exceeds user defined limits use the DSCP Mapping Page to configure the DSCP tag to use in place of the incoming DSCP tags Command Attributes DSCP In DSCP tag on an incoming packet e DSCP Out Sets a new DSCP tag to incoming tag Web Click Policy Advanced Mode DSCP Mapping define the fields and click Apply 3 185 B Configuring the Switch DSCP Mapping DSCP in DSCP Ow Pelele eleele eeel eeaeee Figure 3 86 DSCP Mapping Page CLI The following is an example of the CLI commands used to map DSCP values Console config qos map dscp mutation 1 2 4 5 6 to 63 4 428 Defining QoS Class Maps One IP ACL and or one MAC ACL comprise a class map Class maps are configured to match packet criteria and are matched to packets on a first fit basis For example Class Map A is
191. RP VLAN Registration Protocol GVRP defines a way for switches to exchange VLAN information in order to register VLAN members on ports across the network VLANs are dynamically configured based on join messages issued by host devices and propagated throughout the network GVRP must be enabled to permit automatic VLAN registration and to support VLANs which extend beyond the local switch Default Disabled Command Attributes The GVRP Page is divided into port and LAG parameters The field definitions are the same The GVRP Page contains the following fields GVRP Global Status Indicates if GVRP is enabled on the device The possible field values are Enable Enables GVRP on the selected device e Disable Disables GVRP on the selected device e Unit No Indicates the stacking member for which the GVRP information is displayed e Port Displays the port on which GVRP is enabled The possible field values are 3 170 Configuring VLANs 3 e Port Indicates the port number on which GVRP is enabled e LAG Indicates the LAG number on which GVRP is enabled GVRP State Indicates if GVRP is enabled on the port The possible field values are Enable Enables GVRP on the selected port Disable Disables GVRP on the selected port Dynamic VLAN Creation Indicates if Dynamic VLAN creation is enabled on the interface The possible field values are Enable Enables Dynamic VLAN creation on th
192. RP cache use the no form of this command arp timeout Configures how long an entry remains in the ARP cache To return GC 4 364 to the default configuration use the no form of this command clear arp cache Deletes all dynamic entries from the ARP cache PE 4 364 show arp Displays entries in the ARP table PE 4 365 ip domain lookup Enables the IP Domain Naming System DNS based host GC 4 366 name to address translation To disable DNS based host name to address translation use the no form of this command ip domain name Defines a default domain name used by the software to complete GC 4 366 unqualified hostnames names without a dotted decimal domain name To remove the default domain name use the no form of this command ip name server Defines the available name servers To remove a name server GC 4 367 use the no form of this command ip host Defines static host name to address mapping in the host cache GC 4 368 To remove the name to address mapping use the no form of this command clear host Deletes entries from the host name to address cache PE 4 369 clear host dhcp Deletes entries from the hostname to address mapping received PE 4 369 from Dynamic Host Configuration Protocol DHCP show hosts Displays the default domain name a list of name server hosts the PE 4 370 static and the cached list of host names and addresses ip address The ip address Interface Configuration Ethernet VLAN port channel mode c
193. RP statistics are refreshed every 15 seconds e 30 Sec lIndicates that the GVRP statistics are refreshed every 30 seconds e 60 Sec lIndicates that the GVRP statistics are refreshed every 60 seconds e No Refresh Indicates that the GVRP statistics are not refreshed Join Empty Displays the device GVRP Join Empty statistics Empty Displays the device GVRP Empty statistics Leave Empty Displays the device GVRP Leave Empty statistics Join In Displays the device GVRP Join In statistics Leave In Displays the device GVRP Leave in statistics Leave All Displays the device GVRP Leave all statistics Invalid Protocol ID Displays the device GVRP Invalid Protocol ID statistics Invalid Attribute Type Displays the device GVRP Invalid Attribute ID statistics Invalid Attribute Value Displays the device GVRP Invalid Attribute Value statistics Invalid Attribute Length Displays the device GVRP Invalid Attribute Length statistics Invalid Event Displays the device GVRP Invalid Event statistics Web Click VLAN VLAN GVRP Enable or disable GVRP define the fields and click Apply 3 172 Ey mead pares ard Car si drnerecally seegned to Configuring VLANs 3 WebView Figure 3 78 GVRP Statistics Page CLI The following is an example of the GVRP statistics commands Console gt show gvrp statistics GVRP Statistics Legend rJE rEmp rLE SJE sEmp SLE Port Join Empty Received Empty R
194. Range 0 32 service Service type Possible values telnet ssh http https and snmp Default Setting This command has no default configuration Command Mode Management Access list Configuration mode Command Usage Rules with Ethernet VLAN and port channel parameters are valid only if an IP address is defined on the appropriate interface The system supports up to 128 management access rules Example The following example denies all ports in the access list called mlist Console config Management access list mlist Console config macl deny Related Commands management access list permit Management show management access list management access class The management access class Global Configuration mode command restricts management connections by defining the active management access list To disable this restriction use the no form of this command Syntax management access class console only name no management access class console only Indicates that the device can be managed only from the console name Specifies the name of the access list to be used Range 1 32 characters Default Setting No active management access list specified Command Mode Global Configuration mode 4 387 4 Command Line Interface Command Usage There are no user guidelines for this command Example The following example configures an access list called mlist as the management access li
195. Rapid Spanning Tree Protocol RSTP is enabled mstp Indicates that the Multiple Spanning Tree Protocol RSTP is enabled Default Setting STP is enabled Command Modes Global Configuration mode 4 472 Spanning Tree Commands 4 Command Usage In RSTP mode the device uses STP when the neighbor device uses STP In MSTP mode the device uses RSTP when the neighbor device uses RSTP and uses STP when the neighbor device uses STP Example The following example configures the spanning tree protocol to RSTP console config spanning tree mode rstp Related Commands spanning tree show spanning tree spanning tree forward time The spanning tree forward time Global Configuration mode command configures the spanning tree bridge forward time which is the amount of time a port remains in the listening and learning states before entering the forwarding state To return to the default configuration use the no form of this command Syntax spanning tree forward time seconds no spanning tree forward time seconds Time in seconds Range 4 30 Default Setting The default forwarding time for the IEEE Spanning Tree Protocol STP is 15 seconds Command Modes Global Configuration mode Command Usage When configuring the forwarding time the following relationship should be kept 2 Forward Time 1 gt Max Age Example The following example configures the spanning tree bridge forwarding time to 25 seco
196. Removes the selected rule from the access profile e Unchecked Maintains the rules attached to the access profile Web Click System WebViewMgmt Authentication Profile Rules define the fields and click Apply 3 97 B Configuring the Switch WebView Profiles Rules Accon Profile Nasse 3 Management Sonrce Prefix Prbeaity Wntertace seinen P Ashen L Action Modity Reseve 1 co Figure 3 38 Profiles Rules Page CLI The following is an example of the CLI commands used for configuring Profile Rules Console config ip http server 4 595 Console config ip https server 4 596 Defining Authentication Profiles Authentication profiles allow network administrators to assign authentication methods for user authentication User authentication can be performed locally or on an external server User authentication occurs in the order the methods are selected If the first authentication method is not available the next selected method is used For example if the selected authentication methods are RADIUS and Local and the RADIUS server is not available then the user is authenticated locally The Authentication Profiles Page contains the following fields e Profile Name User defined authentication profile lists to which user defined authentication profiles are added Methods Defines the user authentication methods The possible field values are None Assigns no authentication meth
197. ReqFramesTx 6 InvalidEapolFramesRx 0 EapLengthErrorFramesRx 0 LastEapolFrameVersion 1 LastEapolFrameSource 00 08 78 32 98 78 3 119 B Configuring the Switch Defining Access Control Lists Access Control Lists ACL provide packet filtering for IP frames and MAC addresses Packets entering an ingress port with an active ACL are either admitted or denied entry and the ingress port is disabled If they are denied entry the user can disable the port To filter incoming packets first create an access list add the required rules specify a priority to modify the precedence in which the rules are checked and then bind the list to a specific port For example an ACL rule is defined that states port number 20 can receive TCP packets however if a UDP packet is received the packet is dropped ACLs are composed of access control entries ACEs that are made of the filters that determine traffic classifications The total number of ACEs that can be defined in all ACLs together is 1018 Configuring Access Control Lists An ACL is a sequential list of permit or deny conditions that apply to IP addresses MAC addresses or other more specific criteria This switch tests ingress or egress packets against the conditions in an ACL one by one A packet will be accepted as soon as it matches a permit rule or dropped as soon as it matches a deny rule If no rules match for a list of all permit rules the packet is dropped and if no rul
198. Service type Possible values telnet ssh http https and snmp Default Setting If no permit rule is defined the default is set to deny Command Mode Management Access list Configuration mode Command Usage Rules with Ethernet VLAN and port channel parameters are valid only if an IP address is defined on the appropriate interface The system supports up to 128 management access rules Example The following example permits all ports in the mlist access list Console config management access list mlist Console config macl permit Related Commands management access list deny Management show management access list deny Management The deny Management Access List Configuration mode command defines a deny rule Syntax deny ethernet interface number vlan vian id port channel port channel number service service deny ip source jp address mask mask prefix length ethernet interface number vlan vian id port channel port channel number service service interface number A valid Ethernet port number e vian id A valid VLAN number port channel number A valid port channel number jp address A valid source IP address 4 386 Management ACL Commands 4 e mask A valid network mask of the source IP address prefix length Specifies the number of bits that comprise the source IP address prefix The prefix length must be preceded by a forward slash
199. Settings The Bandwidth Configuration Page allows network managers to define the bandwidth settings for a specified egress interface Modifying queue scheduling affects the queue settings globally Queue shaping can be based per queue and or per interface Shaping is determined by the lower specified value The queue shaping type is selected in the Bandwidth Configuration Page Command Attributes e Interface Indicates the interface for which the queue shaping information is displayed The possible field values are e Port Indicates the port for which the bandwidth settings are displayed LAG Indicates the LAG for which the bandwidth settings are displayed Ingress Configures the traffic shaping type for egress interfaces The possible field values are Status Enables or Disables traffic shaping for ingress interfaces Disable is the default value e Rate Limit Defines the rate limit for ingress ports e Egress Configures the traffic shaping type for egress interfaces The possible field values are Committed Information Rate CIR 4096 1 000 000 000 Defines CIR as the queue shaping type The possible field value is 4096 1 000 000 000 bits per second Committed Burst Size CBS 4096 16 000 000 Defines CBS as the queue shaping type The possible field value is 4096 16 000 000 bytes e None Indicates that a queue shaping type is not defined This is default value Web Click Policy Pri
200. Sswr yf 1FpDOMWOTgDAWIDAQABo4 IBoj CCAZ4wEwYJKwYBBAGCNxQCBAY eBABDAEEw CwROPBAQDAgFGMA8GA1UdEWEB wOFMAMBAf 8wHQOYDVROOBBYEFAf 4MT9BRD47 ZVKBAEL9Ggp 6MI IBNgYDVROfBIIBLTCCASkwgdKggc ggcyGgclsZGFw0i8v LOVByb3h5JTIwU2 9mdHdhcmU1Mj BSb290JTIwQ2VydGlmaWVyLENOPXN1cnZ1 aa END CERTIFICATE Issued by www verisign com Valid from 8 9 2003 to 8 9 2004 Subject CN router gm com 0 General Motors C US Finger print DC789788 DC88A988 127897BC BB789788 Related Commands crypto certificate generate crypto certificate request crypto certificate import ip https certificate show ip http The show ip http Privileged EXEC mode command displays the HTTP server configuration Syntax show ip http Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays the HTTP server configuration console show ip http HTTP server enabled Port 80 Related Commands ip http server 4 603 4 Command Line Interface ip http port show ip https The show ip https Privileged EXEC mode command displays the HTTPS server configuration Syntax show ip https Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays the HTTP server configuration
201. Startup Configuration file The next time the device is restarted the commands are copied back into the Running Configuration file from the Startup Configuration file Image files Software upgrades are used when a new version file is downloaded The file is checked for the right format and that it is complete After a successful download the new version is marked and is used after the device is reset Downloading System Files There are two types of files firmware files and configuration files The firmware files manage the device and the configuration files configure the device for transmissions Only one type of download can be performed at any one time File 3 51 B Configuring the Switch names cannot contain slashes or the leading letter of the file name should not be a period and the maximum length for file names on the TFTP server is 127 characters or 31 characters for files on the switch Valid characters A Z a z 0 9 7 The File Download Page contains parameters for downloading system files Command Attributes Firmware Download Indicates that a firmware file is downloaded If Firmware Download is selected the Configuration Download fields are grayed out Firmware TFTP Server IP Address Specifies the TFTP Server IP Address from which files are downloaded Firmware Source File Name Specifies the file to be downloaded Firmware Destination File Specifies the destinati
202. Trust mode relies on predefined fields within the packet to determine the egress queue settings Command Attributes CoS QoS Mode Indicates if QoS is enabled on the interface The possible values are Enable Enables QoS on the interface e Disable Disables QoS on the interface e Advanced Enables QoS Advanced mode on the interface Copy from Entry Number Copies the port QoS information from the selected port To Entry Number Indicates the port to which the port QoS information is copied Interface Displays the interface for which the global QoS parameters are defined e Port Selects the port for which the global QoS parameters are defined e LAG Selects the LAG for which the global QoS parameters are defined e Default CoS Determines the default CoS value for incoming packets for which a VLAN tag is not defined The possible field values are 0 7 The default CoS is 0 e Restore Defaults Restores the factory QoS default settings to the selected port e Checked Restores the factory QoS default settings to ports e Unchecked Maintains the current QoS settings Web Click Policy General CoS Mode define the fields and click Apply Coses Mode Gece E Copy trom Enny Nombor to Every Murrderts Interface Default CoS Modity Restore Datani vit 0 4 0 o 1 0 ANN NSS NSS SINS NSN SSNS Miainiainiainjanjaliainiaioiaiaiaia Figure 3 79 Port Priority Page 3 178
203. User Interface Commands Table 4 32 User Interface Commands Command Function Mode Page do To execute an EXEC level command from the Global All 4 557 Configuration mode or any configuration submode use the do Configur command in any configuration mode ation Modes enable Enters the Privileged EXEC mode UE 4 558 disable Returns to the User EXEC mode PE 4 558 login Changes a login username UE 4 559 configure Enters the Global Configuration mode PE 4 559 exit Configuration Exits any configuration mode to the next highest mode in the CLI Al 4 560 mode hierarchy Configur ation Modes exit Closes an active terminal session by logging off the device PE UE 4 560 end Ends the current configuration session and returns to the Al 4 561 Privileged EXEC mode Configur ation Modes 4 556 User Interface Commands 4 Table 4 32 User Interface Commands Command Function Mode Page help Displays a brief description of the help system All 4 561 Comma nd Modes terminal data dump Enables dumping all the output of a show command without UE 4 562 prompting To disable dumping use the no form of this command show history Lists the commands entered in the current session UE 4 563 show privilege Displays the current privilege level PE UE 4 564 do The do command executes an EXEC level command from the Global Configuration mode or any configuration submode
204. Util The best estimate of the mean physical layer network utilization on this interface during this sampling interval in hundredths of a percent CRC Align The number of packets received during this sampling interval that had a length excluding framing bits but including FCS octets between 64 and 1518 octets inclusive but had either a bad Frame Check Sequence FCS with an integral number of octets FCS Error or a bad FCS with a non integral number of octets Alignment E rror Undersize The number of packets received during this sampling interval that were less than 64 octets long excluding framing bits but including FCS octets and were otherwise well formed Oversize The number of packets received during this sampling interval that were longer than 1518 octets excluding framing bits butincluding FCS octets but were otherwise well formed Fragments The total number of packets received during this sampling interval that were less than 64 octets in length excluding framing bits butincluding FCS octets had either a bad Frame Check Sequence FCS with an integral number of octets FCS Error ora bad FCS with a non integral number of octets Alignmente rror It is normal for etherHistoryF ragments to increment because it counts both runts which are normal occurrences due to collisions and noise hits Jabbers The number of packets received during this sampling interval that were longer than 1518 octets
205. a system reboot Performing other functions is described later in this section 2 11 20 Initial Configuration Connect Device and Hardware Console i Setup Power on Suspend Bootup Loading pogan from flash Enter Wizard Initial Configuration IP Address Subnet Wizard Configuration mask Users Basic Process Security configuration Startup Menu Special functions Standard Device nstallation Advanced Configuration Advanced IP Address from DHCP i Device IP Address from bootp i Installation Security management H Figure 2 1 Installation and Configuration General Configuration Information Your device has predefined features and setup configuration 2 12 General Configuration Information 2 Auto Negotiation Auto negotiation allows a device to advertise modes of operation and share information with another device that shares a point to point link segment This automatically configures both devices to take maximum advantage of their abilities Auto negotiation is performed completely within the physical layers during link initiation without any additional overhead to either the MAC or higher protocol layers Auto negotiation allows the ports to do the following e Advertise their abilities e Acknowledge receipt and understanding of the common modes of operation that both devices share e Reject the use of operational modes that are not shared by both devices e Configure ea
206. able N S Not Supported W Warning E Error Console show fiber ports optical transceiver detailed Power Port Temp Voltag Current Output nput TX Fault LOS e c Volt mA mWatt mWatt g1 48 E 50 1 789 789 No No g2 43 5 15 10 1 789 789 No No g3 Copper Temp Internally measured transceiver temperature Voltage Internally measured supply voltage Current Measured TX bias current Output Power Measured TX output power nput Power Measured RX received power x Fault Transmitter fault LOS Loss of signal Port Channel Commands Table 4 20 Port Channel Commands Command Function Mode Page interface Enters the interface configuration mode to configure a specific GC 4 394 port channel port channel interface range Enters the interface configuration mode to configure multiple GC 4 394 port channel port channels channel group Associates a port with a port channel To remove a port froma ICE 4 395 port channel use the no form of this command show interfaces Displays port channel information PE 4 396 port channel 4 393 4 Command Line Interface interface port channel The interface port channel Global Configuration mode command enters the interface configuration mode to configure a specific port channel Syntax interface port channel port channel number port channel number A valid port channel number Default Setting This command
207. acl access list mac mask precedence Console config mac mask acl Interface interface ethernet port port channel id vlan id Console config if 4 556 VLAN vlan database Console config vlan 4 564 MSTP spanning tree mst configuration Console config mstp 4 470 Qos class map Console config cmap 4 405 For example you can use the following commands to enter interface configuration mode and then return to Privileged Exec mode Console config interface ethernet 1 e5 Console config if exit Console config Command Line Processing Commands are not case sensitive You can abbreviate commands and parameters as long as they contain enough letters to differentiate them from any other currently available commands or parameters You can use the Tab key to complete partial 4 228 Entering Commands 4 commands or enter a partial command followed by the character to display a list of possible matches You can also use the following editing keystrokes for command line processing Table 4 3 Keystroke Commands Keystroke Function Up Arrows Recalls commands from the history buffer beginning with the most recentcommand Repeatthe key sequence to recall successively older commands Down Arrows Returns the most recent commands from the history buffer after recalling commands with the up arrow key Repeating the key sequence will recall successively more recent commands Ctrl A Moves the c
208. acs group show vlan macs group The show vian macs group priviledged EXEC command displays MAC group information Syntax show vian macs group Default Configuration This command has no default configuration Command Mode Priviledged EXEC mode Command Usage There are no user guidelines for this command 4 590 VLAN Commands 4 Example The following example displays macs groups information Console show vlan macs group MAC Prefix Group 0060 704C 73FF FFFF FFFF 0000 1 0060 704D 73FF FFFF FFFF 0000 1 Related Commands map mac macs group map subnet subnets group The map subnet subnets group VLAN Configuration mode command maps an IP subnet or a group of IP subnets Use the no form of this command to delete the map Syntax map subnet jp address prefix mask subnets group group no map ip address prefix mask jip address Specifies the IP address prefix of the subnet to be entered to the group e prefix mask Specifies the Mask bits The format is the IP address format group Specifies the group number Range 1 2147483647 Default Configuration This command has no default configuration Command Mode VLAN Configuration mode Command Usage There are no user guidelines for this command Example The following example maps an IP subnet or a group of IP subnets console config vlan database console config vlan map subnet 192 1 1 1 27 subnets group 7 Related Commands s
209. adcast packets FCS Errors Counted received frames that are an integral number of octets in length but do not pass the FCS check Single Collision Frames Counted frames that are involved in a single collision and are subsequently transmitted successfully Late Collisions Number of times that a collision is detected later than one slotTime into the transmission of a packet Oversize Packets Counted frames received that exceed the maximum permitted frame size Internal MAC Rx Errors Counted frames for which reception fails due to an internal MAC sublayer receive error Received Pause Frames Counted MAC Control frames received with an opcode indicating the PAUSE operation Transmitted P ause Frames Counted MAC Control frames transmitted on this interface with an opcode indicating the PAUSE operation Related Commands clear counters port storm control include multicast IC The port storm control include multicast Interface Configuration Ethernet mode command counts multicast packets in broadcast storm control To disable counting multicast packets use the no form of this command Syntax port storm control include multicast unknown unicast no port storm control include multicast unknown unicast Specifies also counting unknown unicast packets 4 340 Ethernet Configuration Commands 4 Default Setting Multicast packets are not counted Command Mode Interface Configuration Ethernet mode Comm
210. adcast traffic to the originating group and can eliminate broadcast storms in large networks This also provides a more secure and cleaner network environment An IEEE VLAN is a group of ports that can be located anywhere in the network but communicate as though they belong to the same physical segment VLANs help to simplify network management by allowing you to move devices to a new VLAN without having to change any physical connections VLANs can be easily organized to reflect departmental groups such as Marketing or R amp D usage groups such as e mail or multicast groups used for multimedia applications such as video conferencing VLANs provide greater network efficiency by reducing broadcast traffic and allow you to make network changes without having to update IP addresses or IP subnets VLANs inherently provide a high level of network security since traffic must pass through a configured Layer 3 link to reach a different VLAN This switch supports the following VLAN features Up to 255 VLANs based on the IEEE 802 1Q standard e Distributed VLAN learning across multiple switches using explicit or implicit tagging and GVRP protocol e Port overlapping allowing a port to participate in multiple VLANs End stations can belong to multiple VLANs e Passing traffic between VLAN aware and VLAN unaware devices e Priority tagging Assigning Ports to VLANs Before enabling VLANs for the switch you must first assign each port to
211. address mapping in the host cache To remove the name to address mapping use the no form of this command Syntax ip host name address no ip host name name Name of the host Range 1 158 characters address Associated IP address Default Setting No host is defined Command Mode Global Configuration mode Command Usage Up to 8 host names can be configured Example The following example defines a static host name to address mapping in the host cache Console config ip host accounting Alcatel com 176 10 23 1 Related Commands ip domain lookup ip domain name ip name server clear host show hosts 4 368 IP Addressing Commands 4 clear host The clear host Privileged EXEC mode command deletes entries from the host name to address cache Syntax clear host name e name Specifies the host entry to be removed Range 1 158 characters e Removes all entries Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example deletes all entries from the host name to address cache Console clear host Related Commands ip host clear host dhcp The clear host dhcp Privileged EXEC mode command deletes entries from the host name to address mapping received from Dynamic Host Configuration Protocol DHCP Syntax clear host dhcp name
212. ads the operating system console reload This command will reset the whole system and disconnect your current session Do you want to continue y n n Related Commands stack reload hostname The hostname Global Configuration mode command specifies or modifies the device host name To remove the existing host name use the no form of the command Syntax hostname name no hostname name The host name of the device Range 1 158 characters Default Setting This command has no default configuration Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example specifies the device host name console config hostname Alcatel Alcatel config Related Commands show system stack change unit id The stack change unit id global configuration command changes a specific units unit ID Syntax stack change unit id unit number to new unit number unit number Current unit number Range 1 8 e new unit number New unit number Range 1 8 4 542 System Management Commands 4 Default Setting This command has no default configuration Command Modes Global Configuration Mode Command Usage This command takes effect only after reset Examples The following example changes unit ID 4 to 3 console config stack change unit id 4 to 3 Related Commands stack master show stack stack master
213. aintains the current DNS host mapping list Web Select System IP Addressing Domain Name System Host Mapping Define the fields and click Apply Host Mapping Hest Hames IP Address Remove 1 Cc 2 cr Aes Foo Figure 3 98 DNS Host Mapping Page 3 204 Defining Default Domains 3 CLI The following in an example of the DNS Host Mapping Commands console config ip host accounting abc com 176 10 23 1 4 367 3 205 B Configuring the Switch Viewing Integrated Cable Tests The Copper Cable Page contains fields for performing tests on copper cables Cable testing provides information about where errors occurred in the cable the last time a cable test was performed and the type of cable error which occurred The tests use Time Domain Reflectometry TDR technology to test the quality and characteristics of a copper cable attached to a port Cables up to 120 meters long can be tested Cables are tested when the ports are in the down state with the exception of the Approximated Cable Length test To test cables Command Attributes Unit No Displays the stacking member for which the cable information is displayed Port Specifies the port to which the cable is connected Test Result Displays the cable test results Possible values are e No Cable Indicates that a cable is not connected to the port Open Cable Indicates that a cable is connected on only one side e Short Cable
214. al Time UTC use the no form of this command Syntax clock timezone hours offset minutes minutes offsef zone acronym no clock timezone e hours offset Hours difference from UTC Range 12 13 e minutes offset Minutes difference from UTC Range 0 59 acronym The acronym of the time zone Range Up to 4 characters Default Setting Clock set to UTC Command Mode Global Configuration mode Command Usage The system internally keeps time in UTC so this command is used only for display purposes and when the time is manually set Example The following example sets the timezone to 6 hours difference from UTC Console config clock timezone 6 zone CST Related Commands clock set clock source clock summer time 4 301 4 Command Line Interface clock summer time The clock summer time Global Configuration mode command configures the system to automatically switch to summer time daylight saving time To configure the software not to automatically switch to summer time use the no form of this command Syntax clock summer time recurring usa eu week day month hh mm week day month hh mm offset offset zone acronym clock summer time date date month year hh mm date month year hh mm offset offset zone acronym clock summer time date month date year hh mm month date year hh mm offset offset zone acronym no clock summer time recurring recurring Indicates th
215. alue is 2000 milliseconds Command Mode User EXEC mode Command Usage Press Esc to stop pinging Following are examples of unsuccessful pinging 4 534 System Management Commands 4 Destination does not respond If the host does not respond a no answer from host appears in ten seconds Destination unreachable The gateway for this destination indicates that the destination is unreachable Network or host unreachable The device found no corresponding entry in the route table Examples The following example displays pinging results console gt ping 10 1 1 1 Pinging 10 1 1 1 with 64 bytes of data 64 bytes from 10 1 1 1 icmp_seq 0 time 11 ms 64 bytes from 10 1 1 1 icmp_seq 1 time 8 ms 64 bytes from 10 1 1 1 icmp_seq 2 time 8 ms 64 bytes from 10 1 1 1 icmp_seq 3 time 7 ms 10 1 1 1 PING Statistics 4 packets transmitted 4 packets received 0 packet loss round trip ms min avg max 7 8 11 console gt ping yahoo com Pinging yahoo com 66 218 71 198 with 64 bytes of data 64 bytes from 10 1 1 1 icmp_seq 0 time 11 ms 64 bytes from 10 1 1 1 icmp_seq 1 time 8 ms 64 bytes from 10 1 1 1 icmp_seq 2 time 8 ms 64 bytes from 10 1 1 1 icmp_seq 3 time 7 ms 10 1 1 1 PING Statistics 4 packets transmitted 4 packets received 0 packet loss round trip ms min avg max 7 8 11 Related Commands traceroute traceroute The traceroute User EXEC mode command discovers routes th
216. an 23 4 570 Defining VLAN Interface Settings You can configure VLAN behavior for specific interfaces including the default VLAN identifier PVID accepted frame types ingress filtering GVRP status and GARP The VLAN Interface Configuration Page contains parameters for defining VLAN behavior for specific interfaces Command Attributes e Unit No Indicates the stacking member for which the interface configuration information is displayed e Interface Displays the port number included in the VLAN Interface VLAN Mode Displays the port mode The possible values are General Indicates the port belongs to VLANs and each VLAN is user defined as tagged or untagged full IEEE802 1q mode e Access Indicates a port belongs to a single untagged VLAN When a port is in Access mode the packet types which are accepted on the port cannot be designated Ingress filtering cannot be enabled or disabled on an access port e Trunk Indicates the port belongs to VLANs in which all ports are tagged except for one port that can be untagged Enable Multicast TV VLAN Indicates if a Multicast TV VLAn is enabled on the device Multicast TV VLANs enable VLANs to receive Multicast TV transmissions from ports that are not Access ports The possible field values are e Checked Enables Multicast TV VLANs on the device e Unchecked Disables Multicast TV VLANs on the device e Dynamic Assigns a port to a VLAN based on
217. an States PSI RPS 4 v Psi RPS v x Temporaneo Fast Fu Fad Fant fad m a e ee G S Fant Fang Fag Fant FeS e Dra a y a WebView Figure 3 101 Health Page CLI The following is an example of the device Health CLI commands Unit Unit Unit Console show system Alcatel Main Power Supply OPERATIONAL Fanl Fan2 OK OK 4 548 Redundant Power Supply NOT OPERATIONAL Fan3 Fan4 Fan5 OK OK OK 3 210 Managing RMON Statistics 3 Managing RMON Statistics RMON statistics provide access to a broad range of statistics including a total count of different frame types and sizes passing through each port All values displayed have been accumulated since the last system reboot Viewing RMON Statistics The RMON Statistics Page contains fields for viewing information about device utilization and errors that occurred on the device Command Attributes Interface Indicates the interface for which statistics are displayed The possible field values are e Port Defines the specific port for which RMON statistics are displayed LAG Defines the specific LAG for which RMON statistics are displayed Refresh Rate Defines the amount of time that passes before the interface statistics are refreshed The possible field values are e 15 Sec Indicates that the RMON statistics are refreshed every 15 seconds 30 Sec Indicates that the RMON statistics are refreshed every 30 seconds 60 Sec
218. anagement methods to the rule e Telnet Assigns Telnet access to the rule If selected users accessing the device using Telnet meeting access profile criteria are permitted or denied access to the device e Secure Telnet SSH Assigns SSH access to the rule If selected users accessing the device using Telnet meeting access profile criteria are permitted or denied access to the device e HTTP Assigns HTTP access to the rule If selected users accessing the device using HTTP meeting access profile criteria are permitted or denied access to the device e Secure HTTP HTTPS Assigns HTTPS access to the rule If selected users accessing the device using HTTPS meeting access profile criteria are permitted or denied access to the device e SNMP Assigns SNMP access to the rule If selected users accessing the device using SNMP meeting access profile criteria are permitted or denied access to the device Source IP Address Defines the interface source IP address to which the rule applies e Prefix Length Defines the number of bits that comprise the source IP address prefix or the network mask of the source IP address e Action Defines the action attached to the rule The possible field values are e Permit Permits access to the device Deny Denies access to the device This is the default Remove Removes rules from the selected access profiles The possible field values are Checked
219. and Usage To control multicasts storms use the port storm control broadcast enable and port storm control broadcast rate commands Example The following example enables counting broadcast and multicast packets on Ethernet port 2 e3 Console config interface ethernet 2 e3 Console config if port storm control include multicast Related Commands port storm control broadcast enable port storm control broadcast rate show ports storm control port storm control broadcast enable The port storm control broadcast enable Interface Configuration Ethernet mode command enables broadcast storm control To disable broadcast storm control use the no form of this command Syntax port storm control broadcast enable no port storm control broadcast enable Default Setting Broadcast storm control is disabled Command Mode Interface Configuration Ethernet mode Command Usage Use the port storm control broadcast rate Interface Configuration Ethernet mode command to set the maximum allowable broadcast rate Example The following example enables broadcast storm control on port 1 g5 of a device Console config interface ethernet 1 g5 Console config port storm control broadcast enable 4 341 4 Command Line Interface Related Commands port storm control include multicast IC port storm control broadcast rate show ports storm control port storm control broadcast rate The port storm control
220. and mode To delete an access list use the no form of this command Syntax management access list name no management access list name name Access list name Range 1 32 characters Default Setting This command has no default configuration Command Mode Global Configuration mode Command Usage Use this command to configure a management access list The command enters the Access list Configuration mode where permit and deny access rules are defined using the permit Management and deny Management commands If no match criteria are defined the default is deny If you reenter an access list context the new rules are entered at the end of the access list 4 384 Management ACL Commands 4 Use the management access class command to select the active access list The active management list cannot be updated or removed Management ACL requires a valid management interface which is a port VLAN or port channnel with an IP address or console interface Management ACL only restricts access to the device for management configuration or viewing Example The following example creates a management access list called mlist configures management Ethernet interfaces 1 e1 and 2 e9 and makes the new access list the active list Console config management access list mlist Console config macl permit ethernet 1 e1 Console config macl permit ethernet 2 e9 Console config macl exit Console config management a
221. and the time cannot be established from a SNTP server the switch will only record the time from the factory default set at the last bootup When the SNTP client is enabled the switch periodically sends a request for a time update to a configured time server You can configure up to eight time server IP addresses The switch attempts to poll each server in the configured sequence Polling can be enabled per interface System time is not saved in the NVRAM Configuring Daylight Savings Time The Clock Time Zone Page contains fields for defining system time parameters for both the local hardware clock and the external SNTP clock If the system time is kept 3 64 Configuring System Time 3 using an external SNTP clock and the external SNTP clock fails the system time reverts to the local hardware clock Daylight Savings Time can be enabled on the device The following is a list of Daylight Savings Time start and end times in specific countries Albania From the last weekend of March until the last weekend of October Australia From the end of October until the end of March Australia Tasmania From the beginning of October until the end of March Armenia From the last weekend of March until the last weekend of October Austria From the last weekend of March until the last weekend of October Bahamas From April to October in conjunction with Daylight Savings Time in the United States Belarus
222. ands Table 4 27 Spanning Tree Commands Command Function Mode Page spanning tree Enables spanning tree functionality To disable spanning tree GC 4 472 functionality use the no form of this command spanning tree Configures the spanning tree protocol To return to the default GC 4 472 mode configuration use the no form of this command spanning tree Configures the spanning tree bridge forward time whichis the GC 4 473 forward time amount of time a port remains in the listening and learning states before entering the forwarding state To return to the default configuration use the no form of this command spanning tree Configures the spanning tree bridge hello time which is how often GC 4 474 hello time the device broadcasts hello messages to other devices To return to the default configuration use the no form of this command Spanning tree Configures the spanning tree bridge maximum age To return to GC 4 475 max age the default configuration use the no form of this command spanning tree Configures the spanning tree priority of the device The priority GC 4 476 priority value is used to determine which bridge is elected as the root bridge To return to the default configuration use the no form of this command spanning tree Disables spanning tree on a specific port To enable spanning tree IC 4 476 disable ona port use the no form of this command Spanning tree cost Con
223. ands 4 Command Mode Line Configuration mode Command Usage This command configures the command history buffer size for a particular line To configure the command history buffer size for the current terminal session use the terminal history size User EXEC mode command The maximum number of commands in all buffers is 256 Example The following example changes the command history buffer size to 100 entries for a particular line Console config line history size 100 Related Commands history show history show line terminal history The terminal history user EXEC command enables the command history function for the current terminal session To disable the command history function use the no form of this command Syntax terminal history terminal no history Default Setting The default configuration for all terminal sessions is defined by the history line configuration command Command Mode User EXEC mode Command Usage There are no user guidelines for this command Example The following example disables the command history function for the current terminal session Console no terminal history Related Commands terminal history size 4 381 4 Command Line Interface show line terminal history size The terminal history size User EXEC command configures the command history buffer size for the current terminal session To reset the command history buffer size to the default
224. ant all relevant ports Address Resolution Protocol IP routing generally utilizes routers and Layer 3 switches to inter communicate using various routing protocols to discover network topology and define Routing tables Device Next Hop MAC addresses are automatically derived by ARP This includes directly attached end systems Users can override and supplement this by defining additional ARP Table entries 1 3 1 Introduction Port Configuration You can manually configure the speed duplex mode and flow control used on specific ports or use auto negotiation to detect the connection settings used by the attached device Use the full duplex mode on ports whenever possible to double the throughput of switch connections Flow control should also be enabled to control network traffic during periods of congestion and prevent the loss of packets when port buffer thresholds are exceeded The switch supports flow control based on the IEEE 802 3x standard Rate Limiting This feature controls the maximum rate for traffic transmitted or received on an interface Rate limiting is configured on interfaces at the edge of a network to limit traffic into or out of the network Traffic that falls within the rate limit is transmitted while packets that exceed the acceptable amount of traffic are dropped Port Mirroring The switch can unobtrusively mirror traffic from any port to a monitor port You can then attach a protocol analyzer or RMON pro
225. arameters of an aggregate policer called policer1 that can be applied to multiple classes in the same policy map When the 4 416 QoS Commands 4 average traffic rate exceeds 124 000 bps or the normal burst size exceeds 96000 bytes the packet is dropped Console config qos aggregate policer policerl 124000 96000 exceed action drop Related Commands police show qos aggregate policer police aggregate show qos aggregate policer The show qos aggregate policer User EXEC mode command displays the aggregate policer parameter Syntax show qos aggregate policer aggregate policer name aggregate policer name Specifies the name of the aggregate policer to be displayed Default Setting This command has no default configuration Command Mode User EXEC mode Command Usage There are no user guidelines Example The following example displays the parameters of the aggregate policer called policer1 Console gt show qos aggregate policer policerl aggregate policer policerl 96000 4800 exceed action drop not used by any policy map Related Commands police qos aggregate policer police aggregate police aggregate The police aggregate Policy map Class Configuration mode command applies an aggregate policer to multiple classes within the same policy map To remove an existing aggregate policer from a policy map use the no form of this command 4 417 4 Command Line Interface Syntax poli
226. are trademarks of their respective companies 26801 West Agoura Road Calabasas CA 91301 818 880 3500 FAX 818 880 3505 info ind alcatel com US Customer Support 800 995 2696 International Customer Support 818 878 4507 Internet http eservice ind alcatel com Warning This equipment has been tested and found to comply with the limits for Class A digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions in this guide may cause interference to radio communications Operation of this equipment in a residential area is likely to cause interference in which case the user will be required to correct the interference at his own expense The user is cautioned that changes and modifications made to the equipment without approval of the manufacturer could void the user s authority to operate this equipment It is suggested that the user use only shielded and grounded cables to ensure compliance with FCC Rules This digital apparatus does not exceed the Class A limits for radio noise emissions from digital apparatus set out in the radio interference regulations of the Canadian department of communications Le present appareil numerique niemet pas de bruits radioele
227. arting the authentication process Range 1 10 Default Configuration The default number of times is 2 Command Mode Interface Configuration Ethernet mode Command Usage The default value of this command should be changed only to adjust for unusual circumstances such as unreliable links or specific behavioral problems with certain clients and authentication servers 4 240 802 1x Commands 4 Example The following example sets the number of times that the device sends an EAP request identity frame to 6 Console config interface ethernet 1 e16 Console config if dotlx max req 6 Related Commands dot1x port control dot1x re authentication dot1x timeout re authperiod dot1x timeout quiet period dot1x timeout tx period dot1x timeout supp timeout dot1x timeout server timeout show dot1x show dot1x users dot1x timeout supp timeout The dot1x timeout supp timeout Interface Configuration mode command sets the time for the retransmission of an Extensible Authentication Protocol EAP request frame to the client To return to the default configuration use the no form of this command Syntax dot1x timeout supp timeout seconds no dot1x timeout supp timeout seconds Time in seconds that the device waits for a response to an EAP request frame from the client before resending the request Range 1 65535 seconds Default Configuration Default timeout period is 30 seconds Command Mode Interfac
228. as a GPS system is used as the time source e Stratum 1 A server that is directly linked to a Stratum 0 time source is used Stratum 1 time servers provide primary network time standards Stratum 2 The time source is distanced from the Stratum 1 server over a network path For example a Stratum 2 server receives the time over a network link via NTP from a Stratum 1 server Information received from SNTP servers is evaluated based on the Time level and server type SNTP time definitions are assessed and determined by the following time levels e T1 The time at which the original request was sent by the client e T2 The time at which the original request was received by the server e T3 The time at which the server sent the client a reply e T4 The time at which the client received the server s reply Polling for Unicast Time Information Polling for Unicast information is used for polling a server for which the IP address is known T1 T4 are used to determine the server time This is the preferred method for synchronizing device time Polling for Anycast Time Information Polling for Anycast information is used when the server IP address is unknown The first Anycast server to return a response is used to set the time value Time levels T3 and T4 are used to determine the server time Using Anycast time information for synchronizing device time is preferred to using Broadcast time information 3 70 Config
229. as no default configuration Command Mode User EXEC mode Command Usage There are no user guidelines for this command 4 548 System Management Commands 4 Example The following example displays the system information console show system Unit Type 4 ee Unit Main Power Supply Redundant Power Supply y ees e Unit Fanl Fan2 Fan3 Fan4 Fan5 _ Se i Related Commands show stack show version show version The show version User EXEC mode command displays system version information Syntax show version unit unit e unit Specifies the number of the unit Range 1 8 Default Setting This command has no default configuration Command Mode User EXEC mode Command Usage There are no user guidelines for this command 4 549 4 Command Line Interface Example The following example displays system version information only for demonstration purposes console gt show version SW version 1 0 0 0 date 23 Jul 2004 time 17 34 19 Boot version 1 0 0 0 date 11 Jan 2004 time 11 48 21 HW version 1 0 0 Unit SW version Boot version HW version 1 1 0 0 0 2 178 130 0 2 1 0 0 0 2 178 1 0 0 Related Commands show system show stack service cpu utilization The service cpu utilization Global Configuration mode command enables measuring CPU utilization To return to the default configuration use the no form of this command Syntax service cpu utilization no service cpu utilizatio
230. at packets actually take when traveling to their destination Syntax traceroute ip address hostname size packet_size ttl max tt count packet_count timeout time_ouf source jp address tos tos 4 535 4 Command Line Interface jip address P address of the destination host hostname Host name of the destination host Range 1 158 characters e packet_size Number of bytes in a packet Range 40 1500 e max ttl The largest TTL value that can be used The traceroute command terminates when the destination is reached or when this value is reached Range 1 255 packet_count The number of probes to be sent at each TTL level Range 1 10 e time_out The number of seconds to wait for a response to a probe packet Range 1 60 jjp address One of the device s interface addresses to use as a source address for the probes The device normally selects what it feels is the best source address to use tos The Type Of Service byte in the IP Header of the packet Range 0 255 Default Setting The default number of bytes in a packet is 40 The default maximum TTL value is 30 The default number of probes to be sent at each TTL level is 3 The default timeout interval in seconds is 3 Command Mode User EXEC mode Command Usage The traceroute command takes advantage of the error messages generated by the devices when a datagram exceeds its time to live TTL value The traceroute c
231. at summer time should start and end on the corresponding specified days every year date Indicates that summer time should start on the first specific date listed in the command and end on the second specific date in the command usa The summer time rules are the United States rules eu The summer time rules are the European Union rules e week Week of the month Range 1 5 first last day Day of the week Range first three letters by name like sun date Date of the month Range 1 31 e month Month Range first three letters by name like Jan e year year no abbreviation Range 2000 2097 hh mm Time in military format in hours and minutes Range hh 0 23 mm 0 59 offset Number of minutes to add during summer time Range 1 1440 acronym The acronym of the time zone to be displayed when summer time is in effect Range Up to 4 characters Default Setting Summer time is disabled offset Default is 60 minutes acronym If unspecified default to the timezone acronym If the timezone has not been defined the default is UTC Command Mode Global Configuration mode Command Usage In both the date and recurring forms of the command the first part of the command specifies when summer time begins and the second part specifies when it ends All times are relative to the local time zone The start time is 4 302 Clock Commands 4 relative to standard
232. at the port is assigned a power consumption level of 44 to 12 95 Watts 0 44 3 8 Indicates that the port is assigned a power consumption level of 3 44 Defining PoE Interfaces 3 44 to 3 8 Watts 3 84 6 49 Indicates that the port is assigned a power consumption level of 3 84 to 6 49 Watts 6 49 12 95 Indicates that the port is assigned a power consumption level of 6 49 to 12 95 Watts Powered Device Provides a user defined powered device description The field can contain up to 24 characters Overload Counter Indicates the total power overload occurrences Short Counter Indicates the total power shortage occurrences Denied Counter Indicates times the powered device was denied power Absent Counter Indicates the times the power supply was stopped to the powered device because the powered device was no longer detected Invalid Signature Counter Indicate the times an invalid signature was received Signatures are the means by which the powered device identifies itself to the PSE Signature are generated during powered device detection classification or maintenance Web Click Physical Ethernet Power over Ethernet Interface page Define the fields and click Apply Interface Port Admin Status Oper Status Priority Level Power Consumption Powered Device Modify Remove Td s Ponty Figure 3 9 PoE Interface Page 3 45 B Configuring the Switch CLI The
233. ated and sent to the trap recipients OIDs are selected from either the Select from field or the Object ID field Filter Type Indicates whether to send traps or informs relating to the selected OID Excluded Does not send traps or informs Included Sends traps or informs Remove Deletes filters Checked Deletes the selected filter Unchecked Maintains the list of filters Web Click SNMP Notification Trap Filter Settings Define the fields and click Apply Trap Filter Settings Fine Name F Object Mentifier Subires Filter Type Modity Remove 1 routes 7 a Baa ao Figure 3 32 Trap Filter Settings Page 3 86 Configuring SNMP 3 CLI The following is an example of the Trap Management CLI commands Console config snmp server filter filter name system included Console config snmp server filter filter name system 7 excluded Console config snmp server filter filter name ifEntry 1 included 4 459 Defining SNMP Notification Recipients The SNMP Notification Receiver Page contains information for defining filters that determine whether traps are sent to specific users and the trap type sent SNMP notification filters provide the following services e Identifying Management Trap Targets e Trap Filtering e Selecting Trap Generation Parameters e Providing Access Control Checks Traps indicating status changes are issued by the switch to specified trap ma
234. be severely degraded or everything can come to complete halt You can protect your network from broadcast storms by setting a threshold for broadcast traffic for each port Any broadcast packets exceeding the specified threshold will then be dropped The Storm Control Page provides fields for configuring broadcast storm control Command Attributes e Port Indicates the port from which storm control is enabled The possible field values are e Enable Enables storm control on the selected port e Disable Disables storm control on the selected port e Enable Broadcast Control Indicates if forwarding Broadcast packet types on the interface Rate Threshold The maximum rate kilobytes per second at which unknown packets are forwarded The range is for FE ports is 0 1 000 000 kbits per second The range for GE ports is 3500 1000000 kbits per second The default value is zero All values are rounded to the nearest 64Kbps If the field value is under 64Kbps the value is rounded up to 64Kbps with the exception of the value zero Web Click Security Traffic Control Storm Control define the fields and click Apply 3 132 Creating Trunks 3 Storm Control Global Parameters Comet Multicast with Broadcast Csstio Copy hrom Esay Number to Row Number sif Port Breadcast Commot Rate Threshold Medity SSS SSN SS SSS NNN Figure 3 55 Storm Control Page CLI The following is an example of the Storm Control
235. be to this port to perform traffic analysis and verify connection integrity Port Trunking Ports can be combined into an aggregate connection Trunks can be manually set up or dynamically configured using IEEE 802 3ad Link Aggregation Control Protocol LACP The additional ports dramatically increase the throughput across any connection and provide redundancy by taking over the load if a port in the trunk should fail The switch supports up to 6 trunks Broadcast Storm Control Broadcast suppression prevents broadcast traffic from overwhelming the network When enabled on a port the level of broadcast traffic passing through the port is restricted If broadcast traffic rises above a pre defined threshold it will be throttled until the level falls back beneath the threshold Static Addresses A static MAC address can be assigned to a specific interface on this switch Static addresses are bound to the assigned interface and will not be moved When a static address is seen on another interface the address will be ignored and will not be written to the address table Static addresses can be used to provide network security by restricting access for a known host to a specific port 1 4 Description of Software Features 1 Spanning Tree Protocol The switch supports these spanning tree protocols Spanning Tree Protocol STP IEEE 802 1D This protocol adds a level of fault tolerance by allowing two or more redundant connection
236. bled Command Mode Interface Configuration VLAN mode Command Usage An access port cannot be a member in an unauthenticated VLAN The native VLAN of a trunk port cannot be an unauthenticated VLAN For a general port the PVID can be an unauthenticated VLAN although only tagged packets would be accepted in the unauthorized state Example The following example enables access to the VLAN to unauthorized devices Console config if dot1lx auth not req Related Commands show dot1x advanced dot1x multiple hosts The dot1x multiple hosts Interface Configuration mode command enables multiple hosts clients on an 802 1X authorized port where the authorization state of the port is set to auto To return to the default configuration use the no form of this command Syntax dot1x multiple hosts no dot1x multiple hosts Default Configuration Multiple hosts are disabled Command Mode Interface Configuration Ethernet mode Command Usage This command enables the attachment of multiple clients to a single 802 1 X enabled port In this mode only one of the attached hosts must be successfully authorized for all hosts to be granted network access If the port becomes unauthorized all attached clients are denied access to the network For unauthenticated VLANs multiple hosts are always enabled 4 250 802 1x Commands 4 Multiple hosts must be enabled to enable port security on the port Example The fo
237. bridge multicast forbidden address mac multicast adadress ip multicast address add remove ethernet interface list port channel port channel number list no bridge multicast forbidden address mac multicast adaress ip multicast address e add Defines the port as forbidden Forbidden ports are not included the Multicast group even if IGMP snooping designated the port to join a Multicast group remove Removes ports from the Forbidden Port list mac multicast address A valid MAC multicast address ip multicast address A valid IP multicast address interface list Separate nonconsecutive Ethernet ports with a comma and no spaces hyphen is used to designate a range of ports port channel number list Separate nonconsecutive valid port channels with a comma and no spaces a hyphen is used to designate a range of 4 280 Address Table Commands 4 port channels Default Setting No forbidden addresses are defined Command Modes Interface Configuration VLAN mode Command Usage Before defining forbidden ports the multicast group should be registered Example The following example forbids MAC address 0100 5e02 0203 on port 2 e9 within VLAN 8 Console config interface vlan 8 Console config if bridge multicast address 0100 5e02 0203 Console config if bridge multicast forbidden address 0100 5e02 0203 add ethernet 2 e9 Related Commands bridge multicast filtering
238. c But when the guest user name and password is entered the CLI displays the Console gt prompt and enters normal access mode i e Normal Exec 2 Enter the necessary commands to complete your desired tasks 3 When finished exit the session with the quit or exit command After connecting to the system through the console port the login screen displays User Access Verification Username admin Password CLI session with the OmniStack 6200 is opened To end the CLI session enter Exit Console Telnet Connection Telnet operates over the IP transport protocol In this environment your management station and any network device you want to manage over the network must have a valid IP address Valid IP addresses consist of four numbers 0 to 255 separated by periods Each address consists of a network portion and host portion For example the IP address assigned to this switch 10 1 0 1 consists of a network portion 10 1 0 and a host portion 1 Note The IP address for this switch is unassigned by default 4 223 4 Command Line Interface To access the switch through a Telnet session you must first set the IP address for the switch and set the default gateway if you are managing the switch from a different IP subnet For example Console config interface vlan 1 Console config if ip address 10 1 0 1 255 255 255 0 Console config if exit Console config ip default gateway 10
239. c Forwarding Database Entries The Dynamic Address Table contains the MAC addresses learned by monitoring the source address for traffic entering the switch When the destination address for inbound traffic is found in the database the packets intended for that address are forwarded directly to the associated port Otherwise the traffic is flooded to all ports The Dynamic Addresses Page contains parameters for querying information in the Dynamic MAC Address Table including the interface type MAC addresses VLAN and table storing The Dynamic MAC Address table contains information about the aging time before a dynamic MAC address is erased and includes parameters for querying and viewing the Dynamic MAC Address table The Dynamic MAC Address table contains address parameters by which packets are directly forwarded to the ports The Dynamic Address Table can be sorted by interface VLAN and MAC Address 3 143 B Configuring the Switch Command Attributes Aging Interval secs Specifies the amount of time the MAC address remains in the Dynamic MAC Address table before it is timed out if no traffic from the source is detected The default value is 300 seconds Port Specifies the interface for which the table is queried There are two interface types from which to select MAC Address Specifies the MAC address for which the table is queried VLAN ID Specifies the VLAN ID for which the table is queried Address Table Sort K
240. cation and encryption key for all RADIUS communications between the device and the RADIUS daemon To return to the default configuration use the no form of this command Syntax radius server key key string no radius server key e key string Specifies the authentication and encryption key for all RADIUS communications between the device and the RADIUS server This key must match the RADIUS daemon key used on the RADIUS daemon Range 0 128 characters Default Setting The key string is an empty string Command Mode Global Configuration mode Command Usage There are no user guidelines for this command 4 431 4 Command Line Interface Example The following example defines the authentication and encryption key for all RADIUS communications between the device and the RADIUS daemon console config radius server key alcatel server Related Commands radius server host radius server retransmit radius server source ip radius server timeout radius server deadtime show radius servers radius server retransmit The radius server retransmit Global Configuration mode command specifies the number of times the software searches the list of RADIUS server hosts To reset the default configuration use the no form of this command Syntax radius server retransmit retries no radius server retransmit e retries Specifies the retransmit value Range 1 10 Default Setting The software searches the list
241. cation level The user should enter a concatenated hexadecimal string of the MD5 key MSB and the privacy key LSB If authentication is only required 16 bytes should be entered if authentication and privacy are required 32 bytes should be entered Each byte in the hexadecimal character string is two hexadecimal digits Each byte can be separated by a period or colon 16 or 32 bytes auth sha key sha des keys lIndicates the HMAC SHA 96 authentication level The user should enter a concatenated hexadecimal string of the SHA key MSB and the privacy key LSB If authentication is only required 20 bytes should be entered if authentication and privacy are required 36 bytes should be entered Each byte in the hexadecimal character string is two hexadecimal digits Each byte can be separated by a period or colon 20 or 36 bytes Default Setting No group entry exists Command Mode Global Configuration mode Command Usage If auth md5 or auth sha is specified both authentication and privacy are enabled for the user When a show running config Privileged EXEC mode command is entered a line for this user will not be displayed To see if this user has been added to the configuration type the show snmp users Privileged EXEC mode command An SNMP EnginelD has to be defined to add SNMP users to the device Changing or removing the SNMP EnginelD value deletes SNMPv3 users from the device s database The remote engineid designates t
242. ccess class mlist The following example creates a management access list called mlist configures all interfaces to be management interfaces except Ethernet interfaces 1 e1 and 2 e9 and makes the new access list the active list Console Console Console Console Console Console config Management access list mlist config macl deny ethernet 1 e1 config macl deny ethernet 2 e9 config macl permit config macl exit config Management access class mlist Related Commands permit Management deny Management show management access list show management access class management access class permit Management The permit Management Access List Configuration mode command defines a permit rule Syntax permit ethernet interface number vlan vian id port channel port channel number service service permit ip source jp address mask mask prefix length ethernet interface number vlan vian id port channel port channel number service service 4 385 4 Command Line Interface interface number A valid Ethernet port number e vian id A valid VLAN number e port channel number A valid port channel index jjp address A valid source IP address e mask A valid network mask of the source IP address prefix length Number of bits that comprise the source IP address prefix The prefix length must be preceded by a forward slash Range 0 32 service
243. ce aggregate aggregate policer name no police aggregate aggregate policer name aggregate policer name Specifies the name of the aggregate policer Default Setting This command has no default configuration Command Mode Policy map Class Configuration mode Command Usage An aggregate policer can be applied to multiple classes in the same policy map An aggregate policer cannot be applied across multiple policy maps or interfaces To return to the Policy map Configuration mode use the exit command To return to the Privileged EXEC mode use the end command Example The following example applies the aggregate policer called policer1 to a class called class1 in policy map called policy1 Console config policy map policyl Console config pmap class class1 Console config pmap c police aggregate policerl Related Commands police qos aggregate policer show qos aggregate policer wrr queue cos map The wrr queue cos map Global Configuration mode command maps Class of Service CoS values to a specific egress queue To return to the default configuration use the no form of this command Syntax wrr queue cos map queue id cos1 cos8 no wrr queue cos map queue ia e queue id Specifies the queue number to which the CoS values are mapped cos1 cos8 Specifies CoS values to be mapped to a specific queue Range 0 7 4 418 QoS Commands 4 Default Setting Default cos to queue map C
244. centage Specifies the threshold as a percentage to compare measured power Range 1 99 Default Setting The default threshold is 95 percent Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example configures the power usage threshold for which alarms are sent to 80 Console config power inline usage threshold 80 4 401 4 Command Line Interface Related Commands power inline power inline powered device power inline priority show power inline power inline traps enable The power inline traps enable Global Configuration mode command enables inline power traps To disable inline power traps use the no form of this command Syntax power inline traps enable no power inline traps enable Default Setting Inline power traps are disabled Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example enables inline power traps to be sent when a power usage threshold is exceeded Console config power inline traps enable Related Commands show power inline show power inline The show power inline User EXEC mode command displays the information about inline power Syntax show power inline ethernet interface interface Valid Ethernet port Full syntax unit port Default Setting This command has no default configuration Comma
245. ces This information is used to pass traffic directly between the inbound and outbound ports All the addresses learned by monitoring traffic are stored in the dynamic address table You can also manually configure static addresses that are bound to a specific port An address becomes associated with a port by learning the frame s source address but if a frame that is addressed to a destination MAC address is not associated with a port that frame is flooded to all relevant VLAN ports To prevent the bridging table from overflowing a dynamic MAC address from which no traffic arrives for a set period is erased Packets addressed to destinations stored in either the Static or Dynamic databases are immediately forwarded to the port The Dynamic MAC Address Table can be 3 141 B Configuring the Switch sorted by interface VLAN or MAC Address whereas MAC addresses are dynamically learned as packets from sources that arrive at the device Static addresses are configured manually Defining Static Forwarding Database Entries A static address can be assigned to a specific interface on this switch Static addresses are bound to the assigned interface and cannot be moved When a static address is seen on another interface the address will be ignored and will not be written to the address table To prevent static MAC addresses from being deleted when the device is reset ensure that the port attached to the MAC address is locked Command
246. cess to the device e Secure HTTP HTTPS Assigns HTTPS access to the rule If selected users accessing the device using HTTPS meeting access profile criteria are permitted or denied access to the device e SNMP Assigns SNMP access to the rule If selected users accessing the device using SNMP meeting access profile criteria are permitted or denied access to the device Interface Defines the interface on which the access profile is defined The possible field values are e Port Specifies the port on which the access profile is defined e LAG Specifies the LAG on which the access profile is defined e VLAN Specifies the VLAN on which the access profile is defined Source IP Address Defines the interface source IP address to which the access profile applies The Source IP Address field is valid for a subnetwork Action Defines the action attached to the rule The possible field values are e Permit Permits access to the device Deny Denies access to the device This is the default Web Click System WebViewMgmt Authentication Access Profiles define the fields and click Apply 3 95 B Configuring the Switch Access Profiles s Aecem Prole active Prete Remove 1 e c 2 e ai Figure 3 37 Access Profiles Page CLI The following is an example of the CLI commands used for configuring Access Profiles Console config ip https port 100 4 597 Console config ip ht
247. ch port for the highest level operational mode that both ports can support If connecting a port of the switch to the network interface card NIC of a terminal that does not support auto negotiation or is not set to auto negotiation both the device port and the NIC must be manually set with the Web browser interface or CLI commands to the same speed and duplex mode Note If the station on the other side of the link attempts to auto negotiate with a port that is manually configured to full duplex the auto negotiation results in the station attempting to operate in half duplex The resulting mismatch may lead to significant frame loss This is inherent in the auto negotiation standard Device Port Default Settings The following table describes the device port default settings Function Default Settings Port speed and mode 100 M or 1000M Auto negotiation Port forwarding state Enabled Head of line blocking prevention On Enabled Flow Control Off Back Pressure Off Note These default settings can be modified once the device is installed The following is an example for changing the port speed on port g1 using CLI commands Console config interface ethernet g1 4 323 Console config if speed 100 4 326 2 13 20 Initial Configuration The following is an example for enabling flow control on port e1 using CLI commands Console config interface ethernet e1 4 323 Console config if flo
248. chport access multicast tv vlan 20 Related Commands switchport mode switchport access vlan switchport trunk allowed vlan switchport trunk native vlan switchport general allowed vlan switchport general pvid switchport general ingress filtering disable switchport general acceptable frame type tagged only switchport forbidden vlan show interfaces switchport show vlan multicast tv The show vlan multicast tv priviledged EXEC mode command displays information on multicast tv VLAN source and receiver ports Syntax show vlan multicast tv vian id vlan id VLAN ID of the Multicast TV VLAN Default Configuration This command has no default configuration Command Mode Priviledged EXEC mode 4 585 4 Command Line Interface Command Usage Use this command to display multicast TV VLAN groups Example The following example displays information on multicast tv VLAN source and receiver ports console show vlan multicast tv Source Ports Receiver Ports 1 8 1 9 2 1 18 3 1 18 4 1 18 The following table describes the significant fields shown in the display Field Description Source ports Ports that can transmit and receive traffic to the VLAN Receiver ports Ports that can only receive traffic from the VLAN Related Commands switchport access multicast tv vlan ip igmp snooping multicast tv The ip igmp snooping multicast tv global configuration command defines the Multicast IP ad
249. chport general ingress filtering disable 4 575 Console config if switchport general acceptable frame type tagged only 4 576 Console config interface ethernet 1 e16 4 323 Console config if switchport access multicast tv vlan 20 4 584 3 163 B Configuring the Switch Defining VLAN Groups VLAN groups increase network flexability and portability For example network users grouped by MAC address can log on to the network from multiple locations without moving between VLANs VLANs can be grouped by MAC address Subnets and Protocols Once a user logs on the system attempts to classify the user by MAC address If the user cannot be classified by MAC address the system attempts to classify the user by Subnet If the subnet classification is unsuccessful the system attempts to classify the user by protocol If the protocol classification is unsuccessful the user is classified by PVID Configuring MAC Based VLAN Groups The MAC Based VLAN Groups Page contains information for defining MAC Based VLAN groups Command Attributes Group ID Defines the MAC based VLAN ID The possible field range is 1 2147483647 MAC Address Defines the MAC address assigned to the VLAN group Prefix Defines the MAC address s prefix The possible field range is 0 32 Web Click VLAN VLAN Groups MAC based VLAN Groups Define the fields and click Apply MAC Based VLAN Groups Growp D MAC Abbess Prefix Medity Remo
250. cifies the event index used when a rising threshold is crossed Range 1 65535 fevent Specifies the event index used when a falling threshold is crossed Range 1 65535 type Specifies the method used for sampling the selected variable and calculating the value to be compared against the thresholds Possible values are absolute and delta If the method is absolute the value of the selected variable is compared directly with the thresholds at the end of the sampling interval If the method is delta the selected variable value of the last sample is subtracted from the current value and the difference is compared with the thresholds direction Specifies the alarm that may be sent when this entry is first set to valid Possible values are rising rising falling and falling If the first sample after this entry becomes valid is greater than or equal to rthreshold and direction is equal to rising or rising falling a single rising alarm is generated If the first sample after this entry becomes valid is less than or equal to fthreshold and direction is equal to falling or rising falling a single falling alarm is generated name Specifies the name of the person who configured this alarm If unspecified the name is an empty string Default Setting The type is absolute The startup direction is rising falling Command Mode Global Configuration mode Command Usage There are no user guidelines for this command
251. cifies the remote SSH client username bubble babble Fingerprint in Bubble Babble format e hex Fingerprint in Hex format Default Setting This command has no default configuration Command Mode Privileged EXEC mode 4 519 4 Command Line Interface Command Usage There are no user guidelines for this command Examples The following example displays SSH public keys stored on the device console show crypto key pubkey chain ssh Username Fingerprint bob 9A CC 01 C5 78 39 27 86 79 CC 23 C5 98 59 F1 86 john 98 F7 6E 28 F2 79 87 C8 18 F8 88 CC F8 89 87 C8 console show crypto key pubkey chain ssh username bob Username bob Key 005C300D 06092A86 4886F70D 01010105 00034B00 30480241 00C5E23B 55D6AB22 O4AEF1BA A54028A6 9ACCO1C5 129D99E4 Fingerprint 9A CC 01 C5 78 39 27 86 79 CC 23 C5 98 59 F1 86 Related Commands crypto key generate dsa crypto key generate rsa ip ssh pubkey auth crypto key pubkey chain ssh user key key string show crypto key mypubkey 4 520 Syslog Commands 4 Syslog Commands Table 4 29 Syslog Commands syslog servers Command Function Mode Page logging on Controls error message logging This command sends debug or GC 4 521 error messages to a logging process which logs messages to designated locations asynchronously to the process that generated the messages To disable the logging process use the no form
252. client poll timer Global Configuration mode command Use the sntp client enable Interface Interface Configuration mode command to enable the SNTP client on a specific interface 4 307 4 Command Line Interface Example The following example enables SNTP anycast clients console config sntp anycast client enable Related Commands sntp authentication key sntp authenticate sntp trusted key sntp client poll timer sntp broadcast client enable sntp unicast client enable sntp unicast client poll sntp client enable Interface The sntp client enable Interface Configuration Ethernet port channel VLAN mode command enables the Simple Network Time Protocol SNTP client on an interface This applies to both receive broadcast and anycast updates To disable the SNTP client use the no form of this command Syntax sntp client enable no sntp client enable Default Setting The SNTP client is disabled on an interface Command Mode Interface configuration Ethernet port channel VLAN mode Command Usage Use the sntp broadcast client enable Global Configuration mode command to enable broadcast clients globally Use the sntp anycast client enable Global Configuration mode command to enable anycast clients globally Example The following example enables the SNTP client on Ethernet port 1 e3 Console config interface ethernet 1 e3 Console config if sntp client enable Related Commands cl
253. code dscp number ip precedence number permit igmp any source source wildcara any destination destination wildcara any igmp type dscp number ip precedence number permit tcp any source source wildcard any source port any destination destination wildcara any destination port dscp number ip precedence number flags ist of flags permit udp any source source wildcard any source port any destination destination wildcard any destination port dscp number ip precedence number source Specifies the source IP address of the packet Specify any to indicate IP address 0 0 0 0 and mask 255 255 255 255 source wildcard Specifies wildcard to be applied to the source IP address Use 1s in bit positions to be ignored Specify any to indicate IP address 0 0 0 0 and mask 255 255 255 255 destination Specifies the destination IP address of the packet Specify any to indicate IP address 0 0 0 0 and mask 255 255 255 255 destination wildcard Specifies wildcard to be applied to the destination IP address Use 1s in bit positions to be ignored Specify any to indicate IP address 0 0 0 0 and mask 255 255 255 255 protocol Specifies the abbreviated name or number of an IP protocol 4 266 Range 0 255 The following table lists protocols that can be specified ACL Commands 4
254. community name private community access right read and write and IP address as shown in the following example 2 19 20 Initial Configuration Console configure Config config snmp server community private rw 11 1 1 2 type router 4 452 Config config exit 4 560 Console config show snmp 4 464 Community String Community Access IP address private readWrite 11 1 1 2 Traps are enabled Authentication failure trap is enabled Trap Rec Address Trap Rec Community Version System Contact System Location This completes the initial configuration of the device from a local terminal The configured parameters enable further device configuration from any remote location Advanced Configuration This section provides information about dynamic allocation of IP addresses and security management based on the authentication authorization and accounting AAA mechanism and includes the following topics Configuring IP Addresses through DHCP Configuring IP Addresses through BOOTP Security Management and Password Configuration When configuring receiving IP addresses through DHCP and BOOTP the configuration received from these servers includes the IP address and may include subnet mask and default gateway Retrieving an IP Address From a DHCP Server When using the DHCP protocol to retrieve an IP address the device acts as a DHCP client To retrieve an IP address from a DHCP server perform the following st
255. configuring an SNMPv1 or SNMPv2 notification recipient a notification view for that recipient is automatically generated for all the MIB When configuring an SNMPv1 notification recipient the Informs option cannot be selected If a trap and inform are defined on the same target and an inform was sent the trap is not sent Example The following example enables SNMP traps for host 10 1 1 1 with community string management using SNMPv2 console config snmp server host 10 1 1 1 management 2 4 460 SNMP Commands 4 Related Commands show snmp snmp server v3 host The snmp server v3 host Global Configuration mode command specifies the recipient of Simple Network Management Protocol Version 3 notifications To remove the specified host use the no form of this command Syntax snmp server v3 host ip address hostname username traps informs noauth auth priv udp port port filter filtername timeout seconds retries retries no snmp server host p address hostname username traps informs ip address Specifies the IP address of the host targeted recipient hostname Specifies the name of the host Range 1 158 characters username Specifies the name of the user to use to generate the notification Range 1 25 traps Indicates that SNMP traps are sent to this host e informs Indicates that SNMP informs are sent to this host e noauth Indicates no authentication of
256. cribes significant fields shown above Field Description Index An index that uniquely identifies the entry Interface The sampled Ethernet interface Interval The interval in seconds between samples Requested Samples The requested number of samples to be saved Granted Samples The granted number of samples to be saved Owner The entity that configured this entry Related Commands rmon collection history show rmon history 4 440 RMON Commands 4 show rmon history The show rmon history User EXEC mode command displays RMON Ethernet history statistics Syntax show rmon history index throughput errors other period seconds index Specifies the requested set of samples Range 1 65535 e throughput Indicates throughput counters errors Indicates error counters other Indicates drop and collision counters seconds Specifies the period of time in seconds Range 1 4294967295 Default Setting This command has no default configuration Command Mode User EXEC mode Command Usage There are no user guidelines for this command Examples The following examples displays RMON Ethernet history statistics for index 1 Console gt show rmon history 1 throughput Sample Set 1 Owner CLI Interface 1 el Interval 1800 Requested samples 50 Granted samples 50 Maximum table size 500 Time Octets Packet Broadca Multica Util s st st Jan 18 2002 21 57 0
257. ctive Server Specifies the DNS server that is currently active Note All DNS servers can be selected by clicking Select All in DNS Server Table Do not include the initial dot that separates the host name from the domain name Web Select IP Addressing Domain Name System DNS Server Set the default domain name or DNS server list define the fields and click Apply DNS Server Enable DNS F Detash Domain tame Tye Remove c DNS Server Active Server Remove 1 c Cc 2 c c 3 201 B Configuring the Switch Figure 3 96 DNS Server Page CLI The following is an example of the DNS server commands console config ip name server 176 16 1 18 4 366 3 202 Defining Default Domains 3 Defining Default Domains The Default Domain Name Page provides information for defining default DNS domain names Command Attributes Default Domain Name Contains a user defined default domain name When defined the default domain name is applied to all unqualified host names Type Indicates the Default Domain Name The possible field values are e Dynamic Indicates that the Default Domains is dynamically created e Static Indicates that the Default Domains Name is a static IP address Remove Removes Default Domain Names The possible field values are e Checked Removes the selected Default Domain Names e Unchecked Maintains the current Default Domain Names Web Select System IP Address
258. ctriques depassant les limites applicables aux appareils numeriques de la Class A prescrites dans le reglement sur le brouillage radioelectrique edicte par le ministere des communications du Canada Contents Contents Chapter 1 Introduction 1 1 Key FG AtuneS cnbiscteceiccecscacbes stzcedaacecssactandececsnducntaecesadescectespeanesedene cece esagen eavcscagasete 1 1 Description of Software Features ceceeceeseeeeeeceeeeeeeeeeeeeeeeeeeeeeaeeseeeeaeeeneetaas 1 2 System Defaults sireisas erann iae a Ea ERE ie eaa AEE Raae a Eost 1 7 Chapter 2 Initial Configuration 2 11 General Configuration Information sssesseeseeeieeieeeesiesiesreresinstrnsrnsrrstrnenenns 2 12 Booting the Switch cii c 0c0 echaceee eee eats sees tie taaki niei ag E ioana KEER Configuration Overview Initial Configuration oo eee eee cet eeneeeeeeeeeeeeeeeeaeesaeeeeeeeaeeseeeeeaeeseaeeeaeetiaeeeeeeeaeeed Advanced Configuration Security Management and Password Configuration cccccsssseessteeeeeeees 2 22 Software Download and Reboot esceeeceeeeeeeeeeseeeeeeeeeeaeeeeeseeeeeeesseeeeeeraees 2 24 Startup Menu FUNCTIONS eceeeeeeeeeeeeeeeeeeeeeeeeeeeeeesaeeeeneesaeeseeeeeaeesieeeeaeeeeesaas 2 27 Chapter 3 Configuring the Switch 3 31 Using the Web Interface oo eeceeeeseeeeneeeeeeeeeeneeeeeaaeesenaeeeeeaeeeseeeessnaeeeeneeees 3 31 Navigating the Web Browser Interface eeseeeeeeeseeeeeenneeeeeneeeteneeeeeneeeeee 3
259. d severity 2 messages were not logged resources Application filtering control Buffer log Aug 2004 15 41 43 LINK 3 UPDOWN Interface FastEthernet0 0 changed state to up Aug 2004 15 41 43 LINK 3 UPDOWN Interface Ethernet1 0 changed state to up Aug 2004 15 41 43 LINK 3 UPDOWN Interface Ethernet1 1 changed state to up Aug 2004 15 41 43 LINK 3 UPDOWN Interface Ethernet1 2 changed state to up Aug 2004 15 41 43 LINK 3 UPDOWN Interface Ethernet1 3 changed state to up Aug 2004 15 41 43 SYS 5 CONFIG_I Configured from memory by console Aug 2004 15 41 39 LINEPROTO 5 UPDOWN Line protocol on Interface FastEthernet0 0 changed state to up Aug 2004 15 41 39 LINEPROTO 5 UPDOWN Line protocol on Interface Ethernet1 0 changed state to down Aug 2004 15 41 39 LINEPROTO 5 UPDOWN Line protocol on Interface Ethernet1 1 changed state to down Aug 2004 15 41 39 LINEPROTO 5 UPDOWN Line protocol on Interface Ethernet1 2 changed state to down Aug 2004 15 41 39 LINEPROTO 5 UPDOWN Line protocol on Interface Ethernet1 3 changed state to down Configuring System Time Simple Network Time Protocol SNTP allows the switch to set its internal clock based on periodic updates from a time server SNTP or NTP Maintaining an accurate time on the switch enables the system log to record meaningful dates and times for event entries You can also manually set the clock using the CLI If the clock is not set
260. d authentication traps use the no form of this command Syntax snmp server trap authentication no snmp server trap authentication Default Setting SNMP failed authentication traps are enabled Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example enables SNMP failed authentication traps console config snmp server trap authentication Related Commands snmp server host snmp server v3 host snmp server filter snmp server enable traps snmp server contact The snmp server contact Global Configuration mode command configures the system contact sysContact string To remove system contact information use the no form of the command Syntax snmp server contact text no snmp server contact e text Specifies the string that describes system contact information 4 462 SNMP Commands 4 Range 0 160 characters Default Setting This command has no default configuration Command Mode Global Configuration mode Command Usage Do not include spaces in the text string or place text that includes spaces inside quotation marks Example The following example configures the system contact point called Alcatel_Technical_Support console config snmp server contact Alcatel Technical _ Support Related Commands snmp server location snmp server location The snmp server location Global Configuration mode c
261. d duplex mode and flow control Rate Limiting Input and output rate limiting per port Port Mirroring One or more ports mirrored to single analysis port Port Trunking Supports up to 8 trunks using either static or dynamic trunking LACP Broadcast Storm Control Supported Static Address Up to 16K MAC addresses in the forwarding table IEEE 802 1D Bridge Supports dynamic data switching and addresses learning Store and Forward Switching Supported to ensure wire speed switching while eliminating bad frames Spanning Tree Protocol Supports standard STP Rapid Spanning Tree Protocol RSTP Multiple Spanning Trees MSTP and STP Root Guard Virtual LANs Up to 255 using IEEE 802 1 port based protocol based or private VLANs GVRP Traffic P rioritization Default port priority traffic class map queue scheduling IP Precedence or Differentiated Services Code Point DSCP and TCP UDP Port Qos Supports Quality of Service QoS 1 1 1 Introduction Table 1 1 Key Features Feature Description Multicast Filtering Supports IGMP snooping and query Power over Ethernet Enables PoE support Multicast TV VLAN Supplies multicast transmissions to L2 isolated subscribers without replicating the multicast transmissions for each subscriber VLAN IP Subnet Based Packets are classified according to the packet s source IP subnet in its IP
262. d authentication of the client e force unauthorized Denies all access through this interface by forcing the port to transition to the unauthorized state and ignoring all attempts by the client to authenticate The device cannot provide authentication services to the client through the interface Default Configuration Port is in the force authorized state Command Mode Interface Configuration Ethernet Command Usage It is recommended to disable spanning tree or to enable spanning tree PortFast mode on 802 1x edge ports ports in auto state that are connected to end stations in order to get immediately to the forwarding state after successful authentication Example The following example enables 802 1X authentication on Ethernet port 1 e16 Console config interface ethernet 1 e16 Console config if dotlx port control auto Related Commands dot1x re authentication dot1x timeout re authperiod dot1x timeout quiet period dot1x timeout tx period dot1x max req dot1x timeout supp timeout dot1x timeout server timeout show dot1x show dot1x users 4 235 4 Command Line Interface dot1x re authentication The dot1x re authentication Interface Configuration mode command enables periodic re authentication of the client To return to the default configuration use the no form of this command Syntax dot1x re authentication no dot1x re authentication Default Setting Periodic re authentication is disabled Co
263. d discards untagged frames at ingress To return to the default configuration use the no form of this command Syntax switchport general acceptable frame type tagged only no switchport general acceptable frame type tagged only Default Setting All frame types are accepted at ingress Command Mode Interface Configuration Ethernet port channel mode Command Usage There are no user guidelines for this command Example The following example configures Ethernet port 1 e16 to discard untagged frames at ingress console config interface ethernet 1 e16 console config if switchport general acceptable frame type tagged only 4 576 VLAN Commands 4 Related Commands switchport mode switchport access vlan switchport trunk allowed vlan switchport trunk native vlan switchport general allowed vlan switchport general pvid switchport general ingress filtering disable switchport forbidden vlan show interfaces switchport switchport access multicast tv vlan switchport forbidden vlan The switchport forbidden vlan Interface Configuration mode command forbids adding specific VLANs to a port To return to the default configuration use the remove parameter for this command Syntax switchport forbidden vlan add vian list remove vian list e add vian list Specifies the list of VLAN IDs to be added Separate nonconsecutive VLAN IDs with a comma and no spaces A hyphen designates a range of IDs e remove vian l
264. d network connection to the switch and that the port you are using has not been disabled Be sure you have configured the VLAN interface through which the management station is connected with a valid IP address subnet mask and default gateway Be sure the management station has an IP address in the same subnet as the switch s IP interface to which itis connected If you are trying to connect to the switch via the IP address fora tagged VLAN group your management station and the ports connecting intermediate switches in the network must be configured with the appropriate tag If you cannotconnectusing Telnet you may have exceeded the maximum number of concurrent Telnet SSH sessions permitted Try connecting again ata later time Cannot access the on board configuration program via a serial port connection Be sure you have set the terminal emulator program to VT 100 compatible 8 data bits 1 stop bit no parity and the baud rate set to any of the following 9600 19200 38400 57600 115200 bps Check that the null modem serial cable conforms to the pin out connections provided in the Installation Guide Forgot or lost the password Contact your local distributor 609 m Using System Logs If a fault does occur refer to the Installation Guide to ensure that the problem you encountered is actually caused by the switch If the problem appears to be caused by the switch follow these steps O aS GOs
265. dby until the keys are generated To generate SSH server keys use the crypto key generate dsa and crypto key generate rsa Global Configuration mode commands Example The following example enables configuring the device from a SSH server console config ip ssh server Related Commands ip ssh port show ip ssh crypto key generate dsa The crypto key generate dsa Global Configuration mode command generates DSA key pairs 4 511 4 Command Line Interface Syntax crypto key generate dsa Default Setting DSA key pairs do not exist Command Mode Global Configuration mode Command Usage DSA keys are generated in pairs one public DSA key and one private DSA key If the device already has DSA keys a warning and prompt to replace the existing keys with new keys are displayed This command is not saved in the device configuration however the keys generated by this command are saved in the private configuration which is never displayed to the user or backed up on another device DSA keys are saved to the backup master This command may take a considerable period of time to execute Example The following example generates DSA key pairs console config crypto key generate dsa Related Commands crypto key generate rsa ip ssh pubkey auth crypto key pubkey chain ssh user key key string show crypto key mypubkey show crypto key pubkey chain ssh crypto key generate rsa The crypto key generate
266. ddress the no form of this command to return to the default configuration bridge multicas Enables forwarding all multicast packets on a port To restore the ICV 4 281 forward al default configuration use the no form of this command bridge multicas Forbids a port to be a forward all multicast port To restore the ICV 4 282 forbidden forward all default configuration use the no form of this command bridge aging time Sets the address table aging time To restore the default GC 4 282 configuration use the no form of this command clear bridge Removes any learned entries from the forwarding database PE 4 284 port security Locks the port thereby blocking unknown traffic and preventing IC 4 284 the port from learning new addresses To return to the default configuration use the no form of this command port security mode Configures the port security mode To return to the default IC 4 285 configuration use the no form of this command 4 216 Address Table Commands 4 Table 4 8 Address Table Commands Command Function Mode Page port security max Configures the maximum number of addresses that can be IC 4 286 learned on the port while the port is in port security mode To return to the default configuration use the no form of this command port security routed Adds a MAC layer secure address to a routed port Use the no IC 4 287 secure address for
267. default path cost method to long console config spanning tree pathcost method long Related Commands show spanning tree spanning tree bpdu The spanning tree bpdu Global Configuration mode command defines BPDU handling when the spanning tree is disabled globally or on a single interface To return to the default configuration use the no form of this command Syntax spanning tree bpdu filtering flooding e filtering Filter BPDU packets when the spanning tree is disabled on an interface flooding Flood BPDU packets when the spanning tree is disabled on an interface Default Setting The default setting is flooding Command Modes Global Configuration mode Command Usage There are no user guidelines for this command Example The following example defines BPDU packet flooding when the spanning tree is disabled on an interface console config spanning tree bpdu flooding Related Commands show spanning tree 4 482 Spanning Tree Commands 4 clear spanning tree detected protocols The clear spanning tree detected protocols Privileged EXEC mode command restarts the protocol migration process forces renegotiation with neighboring devices on all interfaces or on a specified interface Syntax clear spanning tree detected protocols ethernet interface port channel port channel number e interface A valid Ethernet port port channel number A valid port channel number Defau
268. den forward all add ethernet 1 e1 Related Commands bridge multicast filtering bridge multicast address bridge multicast forbidden address bridge multicast forward all show bridge multicast filtering bridge aging time The bridge aging time Global Configuration mode command sets the address table aging time To restore the default configuration use the no form of this command Syntax bridge aging time seconds no bridge aging time seconds Time in seconds Range 10 630 seconds Default Setting The default is 300 seconds Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example sets the bridge aging time to 250 seconds Console config bridge aging time 250 4 283 4 Command Line Interface Related Commands bridge address clear bridge show bridge address table clear bridge The clear bridge Privileged EXEC mode command removes any learned entries from the forwarding database Syntax clear bridge Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example clears the bridge tables Console clear bridge Related Commands bridge address port security The port security Interface Configuration mode command locks the port thereby blocking unknown traffic and preventing
269. des Command Usage There are no user guidelines for this command Example The following example changes the configuration mode from Interface Configuration mode to Privileged EXEC mode console config if exit console config exit console Related Commands end exit The exit Privileged User EXEC mode command closes an active terminal session by logging off the device Syntax exit Default Setting This command has no default configuration 4 560 User Interface Commands 4 Command Mode Privileged and User EXEC modes Command Usage There are no user guidelines for this command Example The following example closes an active terminal session console gt exit Related Commands login end end The end command ends the current configuration session and returns to the Privileged EXEC mode Syntax end Default Setting This command has no default configuration Command Mode All configuration modes Command Usage There are no user guidelines for this command Example The following example changes from Global Configuration mode to Privileged EXEC mode console config end console Related Commands exit help The help command displays a brief description of the help system Syntax help Default Setting This command has no default configuration 4 561 4 Command Line Interface Command Mode All command modes Command Usage There are no user guidelines
270. dges to reconfigure the network to reestablish a valid network topology RSTP is designed as a general replacement for the slower legacy STP RSTP is also incorporated into MSTP RSTP achieves must faster reconfiguration i e around one tenth of the time required by STP by reducing the number of state changes before active ports start learning predefining an alternate route that can be 3 145 B Configuring the Switch used when a node or port fails and retaining the forwarding database for ports insensitive to changes in the tree structure when reconfiguration occurs When using STP or RSTP it may be difficult to maintain a stable path between all VLAN members Frequent changes in the tree structure can easily isolate some of the group members MSTP an extension of RSTP is designed to support independent spanning trees based on VLAN groups Once you specify the VLANs to include in a Multiple Spanning Tree Instance MSTI the protocol will automatically build an MSTI tree to maintain connectivity among each of the VLANs MSTP maintains contact with the global network because each instance is treated as an RSTP node in the Common Spanning Tree CST Defining Spanning Tree You can display a summary of the current bridge STA information that applies to the entire switch using the STA Information screen The STP General Page contains the following fields Command Attributes e Spanning Tree State Indicates whether STP is enabled o
271. disable IGMP snooping use the no form of this command Syntax ip igmp snooping no ip igmp snooping Default Setting IGMP snooping is disabled Command Mode Global Configuration mode Command Usage IGMP snooping can only be enabled on static VLANs It must not be enabled on Private VLANs or their community VLANs Example The following example enables IGMP snooping Console config ip igmp snooping Related Commands show ip igmp snooping mrouter ip igmp snooping Interface The ip igmp snooping Interface Configuration VLAN mode command enables 4 352 IGMP Snooping Commands 4 Internet Group Management Protocol IGMP snooping on a specific VLAN To disable IGMP snooping on a VLAN interface use the no form of this command Syntax ip igmp snooping no ip igmp snooping Default Setting IGMP snooping is disabled Command Mode Interface Configuration VLAN mode Command Usage IGMP snooping can only be enabled on static VLANs It must not be enabled on Private VLANs or their community VLANs Example The following example enables IGMP snooping on VLAN 2 Console config interface vlan 2 Console config if ip igmp snooping Related Commands show ip igmp snooping mrouter show ip igmp snooping groups ip igmp snooping host time out The ip igmp snooping host time out Interface Configuration VLAN mode command configures the host time out If an IGMP report for a multicast group
272. dot1x timeout server timeout show dot1x users show dot1x users The show dot1x users Privileged EXEC mode command displays active 802 1X authenticated users for the device Syntax show dot1x users username username username Supplicant username Range 1 160 characters Default Configuration This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command 4 246 802 1x Commands 4 Example The following example displays 802 1X users Console show dot1x users Port Username Session Auth MAC Address Time Method 1 el Bob 1d 03 08 58 Remote 0008 3b79 8787 1 e2 John 08 19 17 None 0008 3b89 3127 Console show dot1lx users username Bob Username Bob Port Username Session Auth MAC Address Time Method 1 el Bob 1d 03 08 58 Remote 0008 3b79 8787 The following table describes significant fields shown above Field Description Port The port number Username The username representing the identity of the Supplicant Session Time The period of time the Supplicant is connected to the system Authentication Method Authentication method used by the Supplicant to open the session MAC Address MAC address of the Supplicant Related Commands dot1x port control dot1x re authentication dot1x timeout re authperiod dot1x timeout quiet period dot1x timeout tx period dot1x max req 4 247 4 Command Line
273. downloaded Software downloading takes several minutes The terminal emulation application such as HyperTerminal may display the progress of the loading process 2 28 Startup Menu Functions 2 After software downloads the device reboots automatically Erase FLASH File In some cases the device configuration must be erased If the configuration is erased all parameters configured via CLI Web browser interface or SNMP must be reconfigured To erase the device configuration 1 From the Startup menu press 2 within 6 seconds to erase flash file The following message is displayed Warning About to erase a Flash file Are you sure Y N y 2 Press Y Note Do not press lt Enter gt The following message is displayed Write Flash file name Up to 8 characters Enter for none config File config if present will be erased after system initialization Press Enter To Continue 3 Enter config as the name of the flash file The configuration is erased and the device reboots 4 Perform the switch s initial configuration Erase FLASH Sectors For troubleshooting purposes the flash sectors may need to be erased If the flash is erased all software files must be downloaded and installed again To erase the FLASH 1 From the Startup menu press 3 within 6 seconds The following message is displayed Warning About to erase Flash Memory FLASH size 1625
274. dresses that are associated with a multicast tv VLAN Use the no form of this command to remove all associations Syntax ip igmp snooping multicast tv vlan vian id add remove ip multicast address count number no ip igmp snooping multicast tv vlan vian id vian id VLAN ID of the Multicast TV VLAN number Configure multiple contiguous multicast IP addresses If not specified the default is 1 Range 1 256 Default Configuration No multicast IP address is associated Command Mode Global configuration mode Usage Guidelines Use this command to define the multicast transmissions on a multicast TV VLAN The configuration is only relevant for an Access port that is a member in the configured VLAN as a multicast TV VLAN 4 586 VLAN Commands 4 If an IGMP map protocol protocols group message is received on an Access port it would be associated with the multicast TV VLAN only if it is for one of the multicast IP addresses that are associated with the multicast TV VLAN Up to 256 VLANs can be configured Example The following example defines the Multicast IP addresses that are associated with a multicast tv VLAN console config ip igmp snooping multicast tv vlan 14 add 239 255 0 0 Related Commands ip igmp snooping multicast tv show ip igmp snooping multicast tv The show ip igmp snooping multicast tv priviledged EXEC command displays the IP addresses associated with Multicast TV VLANs syntax
275. ds management access class management access list PHY Diagnostics Commands Table 4 19 PHY Diagnostics Commands Command Function Mode Page test copper port tdr Uses Time Domain Reflectometry TDR technology to diagnose PE 4 390 the quality and characteristics of a copper cable attached to a port show copper ports Displays information on the last Time Domain Reflectometry UE 4 390 tdr TDR test performed on copper ports show copper ports Displays the estimated copper cable length attached to a port UE 4 391 cable length show fiber ports Displays the optical transceiver diagnostics PE 4 392 optical transceiver 4 389 4 Command Line Interface test copper port tdr The test copper port tdr Privileged EXEC mode command uses Time Domain Reflectometry TDR technology to diagnose the quality and characteristics of a copper cable attached to a port Syntax test copper port tdr interface interface A valid Ethernet port Full syntax unit port Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage The port to be tested should be shut down during the test unless it is a combination port with fiber port active The maximum length of the cable for the TDR test is 120 meter Example The following example results in a report on the cable attached to port 1 e3 Console test copper port tdr 1 e3 Cable is open at 64
276. e Command Usage To see the full multicast address table including static addresses use the show bridge multicast address table Privileged EXEC command Example The following example shows IGMP snooping information on multicast groups Console gt show ip igmp snooping groups Vian IP Address Querier Ports 1 224 239 130 2 2 3 Yes 1 el 2 e2 19 224 239 130 2 2 8 Yes 1 e9 e11 IGMP Reporters that are forbidden statically Related Commands ip igmp snooping Interface ip igmp snooping Global show ip igmp snooping mrouter ip igmp snooping mrouter time out ip igmp snooping leave time out 4 358 IP Addressing Commands 4 IP Addressing Commands Table 4 15 IP Addressing Commands Command Function Mode Page ip address Sets an IP address for interface To remove an IP address use the IC 4 359 no form of this command ip address dhcp Acquires an IP address for an Ethernet interface from the IC 4 360 Dynamic Host Configuration Protocol DHCP server To deconfigure an acquired IP address use the no form of this command ip default gateway Defines a default gateway To return to the default configuration GC 4 361 use the no form of this command show ip interface Sets the interval that the system waits for a login attempt PE 4 362 arp Adds a permanententry in the Address Resolution Protocol ARP GC 4 363 cache To remove an entry from the A
277. e The following example sets the maximum number of addresses that are learned on port 1 e7 before it is locked to 20 Console config interface ethernet 1 e7 Console config if port security mode dynamic Console config if port security max 20 Related Commands port security mode show ports security 4 286 Address Table Commands 4 port security routed secure address The port security routed secure address Interface Configuration Ethernet port channel mode command adds a MAC layer secure address to a routed port Use the no form of this command to delete a MAC address Syntax port security routed secure address mac address no port security routed secure address mac address mac address A valid MAC address Default Setting No addresses are defined Command Mode Interface Configuration Ethernet port channel mode Cannot be configured for a range of interfaces range context Command Usage The command enables adding secure MAC addresses to a routed port in port security mode The command is available when the port is a routed port and in port security mode The address is deleted if the port exits the security mode or is not a routed port Use this command on interfaces that have an IP address configured instead of the command bridge address mac address ethernet interface port channel port channel number secure Example The following example adds the MAC layer address 66 66 66 66 6
278. e show logging aaa logging The aaa logging Global Configuration mode command enables logging AAA login events To disable logging AAA login events use the no form of this command Syntax aaa logging login no aaa logging login login Indicates logging messages related to successful login events unsuccessful login events and other login related events Default Setting Logging AAA login events is enabled Command Mode Global Configuration mode Command Usage Other types of AAA events are not subject to this command 4 527 4 Command Line Interface Example The following example enables logging messages related to AAA login events console config aaa logging login Related Commands show logging file system logging The file system logging Global Configuration mode command enables logging file system events To disable logging file system events use the no form of this command Syntax file system logging copy no file system logging copy file system logging delete rename no file system logging delete rename copy Indicates logging messages related to file copy operations delete rename Indicates logging messages related to file deletion and renaming operations Default Setting Logging file system events is enabled Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example enables logging messages rela
279. e Privileged EXEC mode Command Usage System Management Commands 4 There are no user guidelines for this command Example The following example displays the settings of the syslog servers console show syslog servers Device Configuration IP address Port Severity Facility Description 192 180 2 27 514 Informational local7 192 180 2 28 514 Warning local7 Related Commands logging on System Management Commands Table 4 30 System Management Commands Command Function Mode Page ping Sends ICMP echo request packets to another node on the UE 4 534 network traceroute Discovers routes that packets actually take when traveling to their UE 4 535 destination telnet Enables logging on to a host that supports Telnet UE 4 538 resume Enables switching to another open Telnet session UE 4 541 reload Reloads the operating system PE 4 541 hostname Specifies or modifies the device host name To remove the GC 4 542 existing host name use the no form of the command stack change unitid Changes a specific units unit ID GC 4 543 stack master Enables forcing the selection of a stack master To return to the GC 4 543 default configuration use the no form of this command 4 533 4 Command Line Interface Table 4 30 System Management Commands Command Function Mode Page stack reload Reloads stack members PE 4 544 stack d
280. e LAG number e Name Displays the user defined port name e Link State Displays the link operational status e Member Displays the ports configured to the LAG e Remove Removes the LAG The possible field values Checked Removes the selected LAG e Unchecked Maintains the LAGs Web Click Interface Interface Configuration Trunk Membership Define the fields 3 129 B Configuring the Switch and click Apply Interface Trunk Membership Hrad Name Link State Member Modify Remove LAG LAG NaN Link LAG NaN Link SSSSSNNN ifa jia ite Jia iie Jin Ha 2 3 1 S LAG NaN Link Nat Present 7 s Figure 3 53 Interface Trunk Membership Page CLI The following is an example of the CLI commands for aggregating ports console config channel group 1 mode on 4 332 Configuring LACP Aggregate ports can be linked into link aggregation port groups Each group is comprised of ports with the same speed set to full duplex operations LAG ports can contain different media types if the ports are operating at the same speed Aggregated links can be set up manually or automatically established by enabling Link Aggregation Control Protocol LACP on the relevant links Aggregate ports can be linked into link aggregation port groups Each group is comprised of ports with the same speed e Ports assigned to a common port channel must meet the following criteria Ports must have
281. e Page Figure 3 29 SNMP Group Membership Page Figure 3 30 SNMP Communities Page Figure 3 31 SNMP Notification Properties Page Figure 3 32 Trap Filter Settings Page Figure 3 33 SNMP Notification Receiver Page Figure 3 34 Local Users Passwords Page Figure 3 35 Line Password Page Figure 3 36 Enable Passwords Page Figure 3 37 Access Profiles Page Figure 3 38 Profiles Rules Page Figure 3 39 Authentication Profiles Page Figure 3 40 Authentication Mapping Page Figure 3 41 RADIUS Page Figure 3 42 TACACS Page Figures Figure 3 43 Figure 3 44 Figure 3 45 Figure 3 46 Figure 3 47 Figure 3 48 Figure 3 49 Figure 3 50 Figure 3 51 Figure 3 52 Figure 3 53 Figure 3 54 Figure 3 55 Figure 3 56 Figure 3 57 Figure 3 58 Figure 3 59 Figure 3 60 Figure 3 61 Figure 3 62 Figure 3 63 Figure 3 64 Figure 3 65 Figure 3 66 Figure 3 67 Figure 3 68 Figure 3 69 Figure 3 70 Figure 3 71 Figure 3 72 Figure 3 73 Figure 3 74 Figure 3 75 Figure 3 76 Figure 3 77 Figure 3 78 Figure 3 79 Figure 3 80 Figure 3 81 Figure 3 82 Figure 3 83 Figure 3 84 Figure 3 85 Figure 3 86 Figure 3 87 x Port Security Page Network Authentication Properties Page Port Authentication Page Multiple Hosts Page Authenticated Hosts Page 802 1X Statistic Page ACL Binding Page IP Based ACL Page MAC Based ACL Page Interface Configuration Page Interface Trunk Membership Page Interface LACP Configu
282. e Rename Enabled Management ACL Deny Enabled Buffer log 11 Aug 2004 15 41 43 LINK 3 UPDOWN Interface FastEthernet0 0 changed state to up 11 Aug 2004 15 41 43 SLINK 3 UPDOWN Interface Ethernet1 0 changed state to up 11 Aug 2004 15 41 43 state to up NK 3 UPDOWN Interface Ethernet1 1 changed oe E 11 Aug 2004 15 41 43 state to up 11 Aug 2004 15 41 43 LINK 3 UPDOWN Interface Ethernet1 3 changed state to up 11 Aug 2004 15 41 43 SYS 5 CONFIG_I Configured from memory by console NK 3 UPDOWN Interface Ethernet1 2 changed oe E 11 Aug 2004 15 41 39 LINEPROTO 5 UPDOWN Line protocol on Interface FastEthernet0 0 changed state to up 11 Aug 2004 15 41 39 LINEPROTO 5 UPDOWN Line protocol on Interface Ethernet1 0 changed state to down oe E 11 Aug 2004 15 41 39 NEPROTO 5 UPDOWN Line protocol on Interface Ethernet1 1 changed state to down 11 Aug 2004 15 41 39 LINEPROTO 5 UPDOWN Line protocol on Interface Ethernet1 2 changed state to down 11 Aug 2004 15 41 39 SLINEPROTO 5 UPDOWN Line protocol on Interface Ethernet1 3 changed state to down oe Related Commands logging on logging logging file clear logging file show syslog servers The show syslog servers Privileged EXEC mode command displays the settings of the syslog servers Syntax show syslog servers 4 532 Default Setting This command has no default configuration Command Mod
283. e configuration Ethernet mode Command Usage The default value of this command should be changed only to adjust for unusual circumstances such as unreliable links or specific behavioral problems with certain clients and authentication servers 4 241 4 Command Line Interface Example The following example sets the timeout period before retransmitting an EAP request frame to the client to 3600 seconds Console config if dotlx timeout supp timeout 3600 Related Commands dot1x port control dot1x re authentication dot1x timeout re authperiod dot1x timeout quiet period dot1x timeout tx period dot1x max req dot1x timeout server timeout show dot1x show dot1x users dot1x timeout server timeout The dot1x timeout server timeout Interface Configuration mode command sets the time that the device waits for a response from the authentication server To return to the default configuration use the no form of this command Syntax dot1x timeout server timeout seconds no dot1x timeout server timeout seconds Time in seconds that the device waits for a response from the authentication server Range 1 65535 seconds Default Configuration The timeout period is 30 seconds Command Mode Interface configuration Ethernet mode Command Usage The actual timeout can be determined by comparing the dot1x timeout server timeout value and the result of multiplying the radius server retransmit value with the
284. e hardware version number Software Version Displays the installed software version number Boot Version Displays the current boot version running on the device Web Click System System Mgmt System Information Specify the system name location and contact information for the system administrator then click Apply Sytem Object 136141891135612 System Up Tame O days 1 hoors 27 mentes 13 seconds Dave MAC Address 0000 42 11 4820 Wardware Version 00 0001 Sotware Vorden 10014 Bost Version Figure 3 5 System Information CLI The following is an example of the CLI System Information commands console show system 4 548 3 35 B Configuring the Switch Managing Stacking Stacking provides multiple switch management through a single point as if all stack members are a single unit All stack members are accessed through a single IP address through which the stack is managed The stack is managed from the following e Web based interface e SNMP Management Station Command Line Interface CLI Devices support stacking up to six units per stack or can operate as stand alone units During the Stacking setup one switch is selected as the Stacking Master and another stacking member can be selected as the Secondary Master All other devices are selected as stack members and assigned a unique Unit ID Switch software is downloaded separately for each stack members However all units in the stack must
285. e interface e Disable Disables Dynamic VLAN creation on the interface GVRP Registration Indicates if VLAN registration through GVRP is enabled on the device The possible field values are Enable Enables GVRP registration on the device Disable Disables GVRP registration on the device Web Click VLAN VLAN GVRP Enable or disable GVRP define the fields and click Apply GVRP Status E GVRP Global a wan i ga T imtertace GVRP State Dynamic VLAN Creation GVRP Registration Modity MAN Wet Enable Enade Entis ri macae Global System LAGA LAGI Enable Enatie Enaple Pary Figure 3 77 GVRP Page CLI The following is an example of the GVRP configuration commands Console config gvrp enable 4 345 Console config interface ethernet 1 e6 4 323 Console config if gvrp enable 4 345 Console config if gvrp vlan creation forbid 4 346 Console config if gvrp registration forbid 4 347 3 171 B Configuring the Switch Viewing GVRP Statistics The GVAP Statistics Page contains device statistics for GVRP Command Attributes Interface Specifies the interface type for which the statistics are displayed e Port Indicates port statistics are displayed e LAG Indicates LAG statistics are displayed Refresh Rate Indicates the amount of time that passes before the GVRP statistics are refreshed The possible field values are e 15 Sec Indicates that the GV
286. e port Note that you can also manually add secure addresses to the port using the Static Address Table When the port has reached the maximum number of MAC addresses the selected port will stop learning The MAC addresses already in the address table will be retained and will not age out Any other device that attempts to use the port will be prevented from accessing the switch Disabled ports are activated from the Port Security Page Ensure the following when configuring port security e A secure port has the following restrictions Cannot use port monitoring It cannot be used as a member of a static or dynamic trunk It should not be connected to a network interconnection device Configure a maximum address count for the port to allow access e The device supports the range of 1 128 MAC addresses on a locked port Command Attributes e Interface Indicates the port or LAG name e Interface Status Indicates the host status The possible field values are e Unauthorized Indicates that the port control is Force Unauthorized the port link is down or the port control is Auto but a client has not been authenticated via the port e Not in Auto Mode Indicates that the port control is Forced Authorized and clients have full port access e Single host Lock Indicates that the port control is Auto and a single client has been authenticated via the port e Learning Mode Defines the locked port type The Learning Mode fie
287. e protocol to any protocol IDRP Matches the packet to the Inter Domain Routing Protocol IDRP RSVP Matches the packet to the ReSerVation Protocol RSVP OSPF Matches the packet to the Open Shortest Path First OSPF protocol PIM Matches the packet to Protocol Independent Multicast PIM L2IP Matches the packet to Layer 2 Internet Protocol L2IP e Protocol ID To Match Adds user defined protocols by which packets are matched to the ACE Each protocol has a specific protocol number which is unique The possible field range is 0 255 Source Port Defines the TCP UDP source port to which the ACE is matched This field is active only if 800 6 TCP or 800 17 UDP are selected in the Select from List drop down menu The possible field range is 0 65535 Destination Port Defines the TCP UDP destination port This field is active only if 800 6 TCP or 800 17 UDP are selected in the Select from List drop down menu The possible field range is 0 65535 Source IP Address Matches the source port IP address to which packets are addressed to the ACE Wildcard Mask Defines the source IP address wildcard mask Wildcard masks specify which bits are used and which bits are ignored A wild card mask of 255 255 255 255 indicates that no bit is important A wildcard of 0 0 0 0 indicates that all the bits are important For example if the source IP address 149 36 184 198 and the wildcard mask is 255 36 184
288. e resolved the device can be reconnected to the stack without interruption and the Ring topology is restored Stacking Failover Topology If a failure occurs in the stacking topology the stack reverts to Stacking Failover Topology In the Stacking Failover topology devices operate in a chain formation The Stacking Master determines where the packets are sent Each unit is connected to two neighboring devices except for the top and bottom units Stacking Members and Unit ID Stacking Unit IDs are essential to the stacking configuration The stacking operation is determined during the boot process The operation mode is determined by the Unit ID selected during the initialization process Stacking LEDs are dual mode LEDS During bootup the Stacking LEDs indicate the stacking Unit number When the device is running the stack ID selector displays the unit ID number Pressing a second time displays the port speed For example if the user selected stand alone mode the device boots in the boot up process as a stand alone device The device units are shipped with a default Unit ID of the stand alone unit If the device is operating as a stand alone unit all stacking LEDs are off Once the user selects a different Unit ID it is not erased and remains valid even if the unit is reset Unit ID 1 and Unit ID 2 are reserved for Master enabled units Unit IDs 3 to 8 can be defined for stack members When the Master unit boots or when inserting
289. e the no form of this command Syntax tacacs server source ip source no tacacs server source ip source source Specifies the source IP address Default Setting The source IP address is the address of the outgoing IP interface Command Mode Global Configuration mode Command Usage 4 554 TACACS Commands 4 Example The following example specifies the source IP address console config tacacs server source ip 172 16 8 1 Related Commands tacacs server host tacacs server key tacacs server timeout show tacacs show tacacs The show tacacs Privileged EXEC mode command displays configuration and statistical information about a TACACS server Syntax show tacacs jp address jp address Name or IP address of the TACACS server Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays configuration and statistical information about a TACACS server console show tacacs Device Configuration IP Status Port Single TimeO Source Priority address Connection ut IP 172 1641 Connecte 49 No Globa Global 1 1 d 1 4 555 4 Command Line Interface TimeOut 3 Global values Device Configuration Source IP 172 16 8 1 Related Commands tacacs server host tacacs server key tacacs server timeout tacacs server source ip
290. e to an Extensible Authentication P rotocol E AP request identity frame from the client before resending the request Max req The maximum number of times that the device sends an Extensible Authentication Protocol EAP request frame assuming that no response is received to the client before restarting the authentication process Supplicant timeout Time in seconds the switch waits for a response to an EAP request frame from the client before resending the request Server timeout Time in seconds the switch waits for a response from the authentication server before resending the request Session Time The amount of time the user is logged in MAC address The supplicant MAC address 4 245 4 Command Line Interface Authentication Method The authentication method used to establish the session Termination Cause The reason for the session termination State The current value of the Authenticator PAE state machine and of the Backend state machine Authentication success The number of times the state machine received a Success message from the Authentication S erver Authentication fails The number of times the state machine received a Failure message from the Authentication Server Related Commands dot1x port control dot1x re authentication dot1x timeout re authperiod dot1x timeout quiet period dot1x timeout tx period dot1x max req dot1x timeout supp timeout
291. e trigger that activates the alarm generation Rising is defined by crossing the threshold from a low value threshold to a higher value threshold e Interval Defines the alarm interval time in seconds e Owner Displays the device or user that defined the alarm e Remove Removes the RMON Alarms Table entry Web Click System RMON Alarm define the fields and click Apply 3 221 B Configuring the Switch WebView Figure 3 107 RMON Alarm Page CLI The following is an example of the CLI commands used to set RMON alarms Console config rmon alarm 1000 1 3 6 1 2 1 10 7 2 1 3 51 1000000 1000000 10 20 1 4 443 3 222 Chapter 4 Command Line Interface This chapter describes how to use the Command Line Interface CLI Using the Command Line Interface Accessing the CLI When accessing the management interface for the switch over a direct connection to the server s console port or via a Telnet connection the switch can be managed by entering command keywords and parameters at the prompt Using the switch s command line interface CLI is very similar to entering commands on a UNIX system Console Connection To access the switch through the console port perform these steps 1 At the console prompt enter the user name and password When the administrator user name and password is entered the CLI displays the Console prompt and enters privileged access mode i e Privileged Exe
292. e user defined 802 1p tag based definitions e DSCP The user can configure the system to use the IP DSCP of the incoming packet to the output priority queues The mapping of the IP DSCP to priority queue is set on a per system basis If this mode is active a non IP packet is always classified to the best effort queue The default mapping is shown in the following table Teble35 DSCP Default Mapping Table DSCP Value Queue Number 0 15 ql Lowest Priority 16 31 q2 32 47 q3 48 64 q4 All network traffic which is not assigned a DSCP value is forwarded with Best Effort service After packets are assigned to a specific queue using the chosen classification method various services can be applied Scheduling for output queues can be configured including e Strict priority e Weighted Round Robin WRR 3 176 Configuring Quality of Service 3 Scheduling schemes are specified per system WRR weights to the queues can be assigned in any order For each interface or queue the following output shaping can also be configured Committed Burst Size CBS e Committed Information Rate CIR e Actions for over the limit traffic QoS Modes The device supports the following QoS modes Basic QoS Mode e Advanced QoS Mode Note When moving to and from basic and advanced QoS modes some settings may be lost Basic QoS Mode Basic Mode supports activating one of the following Trust settings e VLAN Point Tag
293. ec P ad ossra f Software Image Upload T TFTP Server IP Address 0 000 Lena Destination File Kame Configuration Upload TFTP Server IP Address Destination File Name Transfer FileName 7 E Figure 3 15 File Upload Page 3 54 Copying Files 3 CLI The following is an example of downloading system files using CLI commands Console copy tftp 172 16 101 101 filel image 4 315 Accessing file filel on 172 16 101 101 Loading filel from 172 16 101 101 POS PP ee eae ea oe ea eee Eee oe ee aa ae E oe DU EORI Copy took 0 01 11 hh mm ss Copying Files Files can be copied and deleted from the Copy Files Page Command Attributes e Copy Master Firmware Copies the Firmware file currently running on the Stacking Master The possible field values are e Source Indicates the Software Image or Bootcode file is selected to be copied e Destination Indicates the stacking member to which the firmware is copied the possible field values are All Backup and stacking members 1 4 Copy Configuration Copies the Running Configuration File The possible field values are The possible field values are e Source Indicates the Running Configuration file is selected Destination Indicates the Startup Configuration file is selected Restore Configuration Factory Defaults Resets the Configuration file to the factory defaults The factory defaults are reset after the device is reset
294. eceived Leave Empty Received Join Empty Sent Empty Sent Leave Empty Sent rJE rJIn rEmp rLIn rLE rJin rLin rLA sdiIn sLIn sLA rLA sJE 4 349 Join In Received Leave In Received Leave All Received Join In Sent Leave In Sent Leave All Sent sJIn sEmp sLiIn SLE sLA 3 173 B Configuring the Switch Configuring Quality of Service Network traffic is usually unpredictable and the only basic assurance that can be offered is best effort traffic delivery To overcome this challenge Quality of Service QoS is applied throughout the network This ensures that network traffic is prioritized according to specified criteria and that specific traffic receives preferential treatment QoS in the network optimizes network performance and entails two basic facilities e Classifying incoming traffic into handling classes based on an attribute including e The ingress interface e Packet content e A combination of these attributes e Providing various mechanisms for determining the allocation of network resources to different handling classes including e The assignment of network traffic to a particular hardware queue e The assignment of internal resources e Traffic shaping In this document the terms Class of Service CoS and QoS are used in the following context CoS provides varying Layer 2 traffic services CoS refers to classification of traffic to traffic classes which are handled as an a
295. ed at the RADIUS server the session is authenticated locally If the session cannot be authenticated locally the session is blocked Local RADIUS None Authentication first occurs locally If authentication cannot be verified locally the RADIUS server authenticates the management method If the RADIUS server cannot authenticate the management method the session is permitted e RADIUS Local None Authentication first occurs at the RADIUS server If authentication cannot be verified at the RADIUS server the session is authenticated locally If the session cannot be authenticated locally the session is permitted HTTP Authentication methods used for HTTP access Possible field values are e None No authentication method is used for access e Local Authentication occurs locally e RADIUS Authentication occurs at the RADIUS server e Line Authentication using a line password 3 100 Defining Access Profiles 3 Enable Authentication using enable Local RADIUS Authentication first occurs locally If authentication cannot be verified locally the RADIUS server authenticates the management method If the RADIUS server cannot authenticate the management method the session is blocked RADIUS Local Authentication first occurs at the RADIUS server If authentication cannot be verified at the RADIUS server the session is authenticated locally If the session cannot be authenticated locally t
296. eed 100 Related Commands copy delete show running config show bootvar The show bootvar Privileged EXEC mode command displays the active system image file that is loaded by the device at startup Syntax show bootvar unit unif e unit Specifies the unit number Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays the active system image file that is loaded by the device at startup Console show bootvar Images currently available on the FLASH image 1 active image 2 not active selected for next boot 4 321 4 Command Line Interface Unit 1 2 Active Image Selected for next boot image 1 image 1 Related Commands boot system Ethernet Configuration Commands Table 4 12 Ethernet Commands advertise Command Function Mode Page interface ethernet Enters the interface configuration mode to configure an Ethernet GC 4 323 type interface interface range Configures multiple Ethernet type interfaces atthe same time GC 4 324 ethernet shutdown Disables an interface To restart a disabled interface use the no IC 4 324 form of this command description Adds a description to an interface To remove the description use IC 4 325 the no form of this command speed Configures the
297. eeessueeesseeeessneees A 605 vi Contents Management Features c cccceesceceseceeeeeeeeeseeeeseeeeneseeeesseneneseneeseeneesnenene A 606 SLAIN ETRO ER E csi 2 ach ee Vaca aeasd A amnente tenets A 606 Management Information Bases ou eeeeesseeeseeeeeeneeeeeeeeseaeeeseneeeeeeneereaeeees A 607 Problems Accessing the Management Interface sesser B 609 Using System LOGS oo eeceeeceesceeeeeeeeeseeseaeeeaeeseaeesaeesnaeesseeseaeeeaeessaeeeaeeeeees B 610 vii Contents viii Figures Figures Figure 2 1 Installation and Configuration Figure 2 2 Send File window Figure 3 3 Home Page Figure 3 4 Ports Panel Figure 3 5 System Information Figure 3 6 Stack Management Topology Page Figure 3 7 Stack Management Reset Page Figure 3 8 PoE Properties Page Figure 3 9 PoE Interface Page Figure 3 10 IP Interface Page Figure 3 11 Default Gateway Page Figure 3 12 DHCP Page Figure 3 13 ARP Page Figure 3 14 File Download Page Figure 3 15 File Upload Page Figure 3 16 Copy Files Page Figure 3 17 Log Settings Page Figure 3 18 Memory Logs Page Figure 3 19 FLASH Logs Page Figure 3 20 Remote Log Page Figure 3 21 Clock Time Zone Page Figure 3 22 SNTP Configuration Global Settings Page Figure 3 23 SNTP Authentication Page Figure 3 24 SNTP Servers Page Figure 3 25 SNTP Interface Page Figure 3 26 SNMP Security Global Parameters Page Figure 3 27 SNMP Views Page Figure 3 28 SNMP Group Profil
298. eekend of March until the last weekend of October e Paraguay From April 6 until September 7 e Poland From the last weekend of March until the last weekend of October e Portugal From the last weekend of March until the last weekend of October Romania From the last weekend of March until the last weekend of October e Russia From the last weekend of March until the last weekend of October Serbia From the last weekend of March until the last weekend of October e Slovak Republic From the last weekend of March until the last weekend of October South Africa South Africa does not use Daylight Saving Time Spain From the last weekend of March until the last weekend of October Sweden From the last weekend of March until the last weekend of October e Switzerland From the last weekend of March until the last weekend of October e Syria From March 31 until October 30 e Taiwan Taiwan does not use Daylight Saving Time Turkey From the last weekend of March until the last weekend of October United Kingdom From the last weekend of March until the last weekend of October e United States of America From the first Sunday in April at 02 00 to the last Sunday in October at 02 00 Command Attributes e Clock Source The source used to set the system clock The possible field values are e None Indicates that a clock source is not used The clock is set locally e
299. een the device and the RADIUS server This key must match the RADIUS daemon key used on the RADIUS daemon To specify an empty string enter Range 0 128 characters source Specifies the source IP address to use for communication 0 0 0 0 is interpreted as request to use the IP address of the outgoing IP interface priority Determines the order in which servers are used where 0 has the highest priority Range 0 65535 Default Setting No RADIUS server host is specified The port number for authentication requests is 1812 The usage type is all Command Mode Global Configuration mode 4 430 Radius Commands 4 Command Usage To specify multiple hosts multiple radius server host commands can be used If no host specific timeout retries deadtime or key string values are specified global values apply to each RADIUS server host The address type of the source parameter must be the same as the ip address parameter Example The following example specifies a RADIUS server host with IP address 192 168 10 1 authentication request port number 20 and a 20 second timeout period console config radius server host 192 168 10 1 auth port 20 timeout 20 Related Commands radius server key radius server retransmit radius server source ip radius server timeout radius server deadtime show radius servers radius server key The radius server key Global Configuration mode command sets the authenti
300. emote Authentication Dial in User Service RADIUS and Terminal Access Controller Access Control System Plus TACACS are logon authentication protocols that use software running on a central server to control access to RADIUS aware or TACACS aware devices on the network An authentication server contains a database of multiple user name password pairs with associated privilege levels for each user that requires management access to the switch For example if you select 1 RADIUS 2 TACACS and 3 Local the user name and password on the RADIUS server is verified first If the RADIUS server is not available then authentication is attempted using the TACACS server and finally the local user name and password is checked Ensure the following when configuring Authentication Profiles By default management access is always checked against the authentication database stored on the local switch If a remote authentication server is used you must specify the authentication sequence and the corresponding parameters for the remote authentication protocol Local and remote logon authentication control management access via the console port web browser or Telnet e RADIUS and TACACS logon authentication assign a specific privilege level for each user name password pair The user name password and privilege level must be configured on the authentication server Command Attributes e Access Profile Name Defines the access profile name T
301. endent Interface Use for end stations e MDIX Media Dependent Interface with Crossover Use for hubs and switches e PVE Enables a port to be a Private VLAN Edge PVE port When a port is defined as PVE it bypasses the Forwarding Database FDB and forwards all Unicast Multicast and Broadcast traffic to an uplink except MAC to me packets Uplinks can be a port or GE port Traffic from the uplink is distributed to all interfaces Web Click Port Interface Configuration Modify the required interface settings and click Apply 3 127 B Configuring the Switch Interface Configuration si io TE Interface Mame Port Type Port States Port Speed Duplex Mode Auto Negotiation Adver sement Back Pressore Flew Ceatol MDIMDIK LAG PVE Medity 1 Vet 1000M copper Up 100m Mar Capadity Disable Ato 2 Mel 100M copper Up 1000m Maz Copabaty Disable Auto 7 3 Ted 1000M copper Up 1000m Max Capabity Disable Auta z 4 vet 1000M copper Up 1000M Ma Capabaty Ostade Auto 5 es 1000M copper Up 100M Mas Capab ty Omabee Ato 4 16 1000M capper Up 1000M Max Capabity Disable Auto 7 eT 000M copper Up 1000m C Desde Auto z g Wel 1000M copper Up 700M Disable Auta z s va 1000M copper Up 100M Drsadie Ato nd w Wet 1000M copper Up 1000m Disable Aito n Meti 1000M copper Up 100M Disable Aito CA R Mel 1000M copper Up 100M Drsabie Ato n Wela IO0OM copper Up 1000M Ortadi Auto u Weta 1000M copper Up 100M Omabee Ato 4 5 MetS 1000M c
302. entication default 4 259 Console config line password jones 4 262 When initially logging onto a device through a SSH session enter jones at the password prompt When changing a device mode to enable enter jones 2 23 20 Initial Configuration Configuring an Initial HTTP Password To configure an initial HTTP password enter the following commands Console config ip http authentication local 4 259 Console config username admin password useri level 15 4 264 Configuring an initial HTTPS Password To configure an initial HTTPS password enter the following commands Console config ip https authentication local 4 260 Console config username admin password userl level 15 4 264 Enter the following commands once when configuring to use a console a Telnet or an SSH session in order to use an HTTPS session In the Web browser enable SSL 2 0 or greater for the content of the page to appear Console config crypto certificate generate key generate 4 598 Console config ip https server 4 596 When initially enabling an http or https session enter admin for user name and userl for password Note HTTP and HTTPS services require level 15 access and connect directly to the configuration level access Software Download and Reboot Software Download through XModem This section contains instructions for downloading device software system and boot images using XModem which is a data
303. eout 30 Seconds Server timeout 30 Seconds Session Time HH MM SS 08 19 17 MAC Address 00 08 78 32 98 78 Authentication Method Remote 4 244 Termination Cause Supplicant logoff Ena Ena Ena Dis Dis Reauth Period 3600 3600 3600 3600 3600 Reauth Period 3600 Username Bob John Clark n a n a Username Clark Authenticator State Machine State HELD Backend State Machine State IDLE Authentication success 9 Authentication fails 1 802 1x Commands 4 The following table describes significant fields shown above Field Description Port The port number Admin mode The port admin mode Possible values F orce auth Force unauth Auto Oper mode The port oper mode Possible values Authorized Unauthorized or Down Reauth Control Reauthentication control Reauth Period Username Quiet period Reauthentication period The username representing the identity of the Supplicant This field shows the username in case the portcontrol is auto If the portis Authorized it shows the username of the current user If the port is unauthorized it shows the last user that was authenticated successfully The number of seconds that the device remains in the quiet state following a failed authentication exchange for example the client provided an invalid password Tx period The number of seconds thatthe device waits for a respons
304. eps 1 Select and connect any port to a DHCP server or to a subnet that has a DHCP server on it in order to retrieve the IP address 2 Enter the following commands to use the selected port for receiving the IP address In the following example the commands are based on the port type used for configuration 2 20 Advanced Configuration 2 e Assigning Dynamic IP Addresses console configure console config interface ethernet el 4 323 console config if ip address dhcp hostname sales 4 360 console config if exit 4 560 console config The interface receives the IP address automatically 3 To verify the IP address enter the show ip interface command at the system prompt as shown in the following example Console show ip interface Gateway IP Type Activity status Address a ete IP address Interface Type Directed Broadcast ee eee Notes 1 The device configuration does not have to be deleted to retrieve an IP address for the DHCP server 2 When copying configuration files avoid using a configuration file that contains an instruction to enable DHCP on an interface that connects to the same DHCP server or to one with an identical configuration In this instance the switch retrieves the new configuration file and boots from it The device then enables DHCP as instructed in the new configuration file and the DHCP instructs it to reload the same file again Receiving an IP Addre
305. er 2 is inserted in the first minute of a ten minute cycle and Stack member 1 is inserted in fifth minute of the same cycle the units are considered the same age If there are two Master enabled units that are the same age then Unit 1 is elected Stacking Master The Stacking Master and the Secondary Master maintain a Warm Standby The Warm Standby ensures that the Secondary Master takes over for the Stacking Master if a failover occurs This guarantees that the stack continues to operate normally During the Warm Standby the Master and the Secondary Master are synchronized with the static configuration only When the Stacking Master is configured the Stacking Master must synchronize the Stacking Secondary Master The Dynamic configuration is not saved for example dynamically learned MAC addresses are not saved Each port in the stack has a specific Unit ID port type and port number which is part of both the configuration commands and the configuration files Configuration files are managed only from the device Stacking Master including e Saving to the FLASH e Uploading Configuration files to an external TFTP Server e Downloading Configuration files from an external TFTP Server Whenever a reboot occurs topology discovery is performed and the master learns all units in the stack Unit IDs are saved in the unit and are learned through topology discovery If a unit attempts to boot without a selected Master and the unit is not op
306. er a serial connection to the console port or via Telnet For more information on using the CLI refer to Chapter 4 Command Line Interface Prior to accessing the switch from a Web browser be sure you have first performed the following tasks 1 Configure the switch with a valid IP address subnet mask and default gateway using an out of band serial connection BOOTP or DHCP protocol 2 Setuser names and passwords using an out of band serial connection Access to the Web agent is controlled by the same user names and passwords as the onboard configuration program 3 After you enter a user name and password you will have access to the system configuration program Notes 1 If you log into the CLI interface as guest Normal Exec level you can view the configuration settings or change the guest password If you log in as admin Privileged Exec level you can change the settings on any page 2 If the path between your management station and this switch does not pass through any device that uses the Spanning Tree Algorithm then you can set the switch port attached to your management station to fast forwarding i e enable Admin Edge Port to improve the switch s response time to management commands issued through the web interface Navigating the Web Browser Interface To access the web browser interface you must first enter a user name and password The administrator has Read Write access to all configuration paramet
307. er from which GARP parameters are copied To Row Number Indicates the row number to which GARP parameters are copied Interface Displays the port or LAG on which GARP is enabled Join Timer Indicates the amount of time in centiseconds that PDUs are transmitted The default value is 20 centiseconds Leave Timer Indicates the amount of time lapse in centiseconds that the device waits before leaving its GARP state Leave time is activated by a Leave All Time message sent received and cancelled by the Join message received Leave time must be greater than or equal to three times the join time The default value is 60 centiseconds Leave All Timer Indicates the amount of time lapse in centiseconds that all device waits before leaving the GARP state The leave all time must be greater than the leave time The default value is 1000 centiseconds Web Click VLAN VLAN GVRP Enable or disable GVRP and click Apply 3 169 B Configuring the Switch GARP Parameters Copy hom Entry Number to Row Naber Jobn Times Leave Timer Leave All Timet ya guy fcentiveconsde contvecendy cemtivecandsl 5 E 1000 100 1000 1000 eeeeees 888888 8 NNN SSISSIS SSS SS BS Baana Ree eee Figure 3 76 GARP Page CLI The following is an example of the GARP configuration commands Console config interface ethernet 1 e6 4 323 Console config if garp timer leave 900 4 345 Defining GVRP GA
308. erating Output Power Indicates the rate at which the output power is transmitted Input Power Indicates the rate at which the input power is transmitted Transmitter Fault Indicates if a fault occurred during transmission Loss of Signal Indicates if a signal loss occurred in the cable Data Ready Indicates the transceiver has achieved power up and data is ready Web Click Physical Diagnostics Optical Transceivers define the fields and click Test Now 3 207 B Configuring the Switch Optical Transceiver Uio TE Pont Temperature Voiage Current Outpat Power Input Power Trammimer Fant Loss of Signal Data Ready Tee te tse Figure 3 100 Optical Transceiver Page CLI The following is an example of the CLI commands used to fiber cables Console show fiber ports optical transceiver 4 392 Power Port Temp Voltage Current Output Input TX Fault LOS 1 gl W OK E OK OK OK OK 1 g2 OK OK OK OK OK E OK 1 93 Copper Temp Internally measured transceiver temperature Voltage Internally measured supply voltage Current Measured TX bias current Output Power Measured TX output power Input Power Measured RX received power Tx Fault Transmitter fault LOS Loss of signal N A Not Available N S Not Supported W Warning E Error Viewing Device Health The Health Page displays physical device information including information about
309. erating in stand alone mode the unit does not boot Configuration files are changed only through explicit user configuration Configuration files are not automatically modified when e Units are Added e Units are Removed e Units are reassigned Unit IDs e Units toggle between Stacking Mode and Stand alone Mode Each time the system reboots the Startup Configuration file in the Master unit is used to configure the stack If a stack member is removed from the stack and then replaced with a unit with the same Unit ID the stack member is configured with the original device configuration Only ports which are physically present are displayed in the home page and can be configured through the WebViewMgmt system Non present ports are configured through the CLI or SNMP interfaces 3 38 Configuring Stacking 3 Exchanging Stacking Members If a stack member with the same Unit ID replaces an existing Unit ID with the same Unit ID the previous device configuration is applied to the inserted stack member If the new inserted device has either more than or less ports than the previous device the relevant port configuration is applied to the new stack member Switching between the Stacking Master and the Secondary Master The Secondary Master replaces the Stacking Master if the following events occur e The Stacking Master fails or is removed from the stack e Links from the Stacking Master to the stacking members fails A soft switchover
310. erface to receive or not receive updates e Remove Removes SNTP interfaces Checked Removes the selected SNTP interface e Unchecked Maintains the selected SNTP interfaces Web Select System System Mgmt SNTP Interface Define the fields and click Apply SNTP Interface Receive intortaco co ivets Updates Remove s Figure 3 25 SNTP Interface Page 3 75 B Configuring the Switch CLI The following is an example of the SNTP interface commands Console config interface ethernet 1 e3 4 323 Console config if sntp client enable 4 308 Configuring SNMP Simple Network Management Protocol SNMP is a communication protocol designed specifically for managing devices on a network Equipment commonly managed with SNMP includes switches routers and host computers SNMP is typically used to configure these devices for proper operation in a network environment as well as to monitor them to evaluate performance or detect potential problems Managed devices supporting SNMP contain software which runs locally on the device and is referred to as an agent A defined set of variables known as managed objects is maintained by the SNMP agent and used to manage the device These objects are defined in a Management Information Base MIB that provides a standard presentation of the information controlled by the agent SNMP defines both the format of the MIB specifications and the protocol used to access this informat
311. ers and statistics Home Page When your web browser connects with the switch s web agent the home page is displayed as shown below The home page displays the Main Menu on the left side of the screen and System Information on the right side The Main Menu links are 3 31 B Configuring the Switch used to navigate to other menus and display configuration parameters and statistics WebView System Management Home Pates me The System Management feature is cied to manage sw sh fies The System Matapomere festus provides detaied ferme emtch hardware and software ancien specie informaban for each unt in te Stach The User can carigure the the spots view loaded mape tes create snaprhot Sios e emtch RIE Figure 3 3 Home Page Configuration Options Configurable parameters have a dialog box or a drop down list Once a configuration change has been made on a page be sure to click on the Apply or Apply Changes button to confirm the new setting The following table summarizes the web page configuration buttons 3 32 Navigating the Web Browser Interface 3 Table 3 1 Add Adds new device configuration information Modify Modifies existing device configuration information Apply Saves new or modified configuration information to the device Delete Checkbox Deletes current device configuration information Test Now Performs either copper or fiber cable tests Clear Counters Clears device statis
312. es PE 4 337 description show interfaces Displays traffic seen by the physical interface UE 4 337 counters portstorm control Counts multicast packets in broadcast storm control To disable ICE 4 340 include multicast counting multicast packets use the no form of this command IC portstorm control Enables broadcast storm control To disable broadcast storm ICE 4 341 broadcastenable control use the no form of this command portstorm control Configures the maximum broadcast rate To return to the default ICE 4 342 broadcast rate configuration use the no form of this command show ports Displays the storm control configuration UE 4 342 storm control interface ethernet The interface ethernet Global Configuration mode command enters the interface configuration mode to configure an Ethernet type interface Syntax interface ethernet interface e interface Valid Ethernet port Full syntax unit port Default Setting This command has no default configuration Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example enables configuring Ethernet port 5 e18 Console config interface ethernet 5 e18 Related Commands interface range ethernet show interfaces configuration 4 323 4 Command Line Interface show interfaces status interface range ethernet The interface range etherne
313. es match for a list of all deny rules the packet is accepted The following fiters can be defined as ACEs Source Port IP Address and Wildcard Mask Filters the packets by the Source port IP address and wildcard mask Destination Port IP Address and Wildcard Mask Filters the packets by the Source port IP address and wildcard mask ACE Priority Filters the packets by the ACE priority e Protocol Filters the packets by the IP protocol e DSCP Filters the packets by the DiffServ Code Point DSCP value e IP Precedence Filters the packets by the IP Precedence e Action Indicates the action assigned to the packet matching the ACL Packets are forwarded or dropped In addition the port can be shut down a trap can be sent to the network administrator or packet is assigned rate limiting restrictions for forwarding When configuring ACLs ensure the following e Each ACL can have up to 256 Access Control Elements ACE rules The maximum number of ACLs is 1018 per port e You must configure a mask for an ACL rule before you can bind it to a port or set the queue or frame priorities associated with the rule e When an ACL is bound to an interface as an egress filter all entries in the ACL must be deny rules Otherwise the bind operation will fail e The switch does not support the explicit deny any rule for the egress IP ACL or the egress MAC ACLs If these rules are included in ACL and you attempt
314. es that support those situations the snmp server set command is used This command is case sensitive Example The following example configures the scalar MIB sysName with the value Alcatel console config snmp server set sysName sysname Alcatel Related Commands snmp server contact snmp server location show snmp The show snmp Privileged EXEC mode command displays the SNMP status Syntax show snmp Default Setting This command has no default configuration 4 464 Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example SNMP Commands 4 The following example displays the SNMP communications status console show snmp Communit y String cess public private private su Community stri ng Traps are enabled Community Ac read only read write View name user view Default DefaultSu per Group name user grou P Authentication trap is enabled Version 1 2 notifications Target Address 192 122 173 42 192 122 173 42 Version 3 notifications Target Address Community Username IP address All ly rat I res a HOY Bt bay Lya IP address all Version UDP Port 2 162 2 162 Security UDP Level Port Filter Name Filter Name To Sec 15 15 To Sec Retri es Retri es 4 465 4 Command Line Interface 192 122 173 42 Inform Bob Priv 162 1
315. ess Type Ports 1 01 00 5e 02 02 03 static 1 el 2 e2 19 01 00 5e 02 02 08 static 1 el e8 19 00 00 5e 02 02 08 dynamic 1 e9 e11 Forbidden ports for multicast addresses vlan MAC Address Ports 1 01 00 5e 02 02 03 2 e8 19 01 00 5 02 02 08 2 e8 Console show bridge multicast address table format ip Vian IP MAC Address Type Ports 3 224 239 130 2 2 3 static 1 e1 2 e2 19 224 239 130 2 2 8 static 1 e1 8 19 224 239 130 2 2 8 dynamic 1 e9 11 Forbidden ports for multicast addresses vlan IP MAC Address Ports 1 224 239 130 2 2 3 2 e8 19 224 239 130 2 2 8 2 e8 Note A multicast MAC address maps to multiple IP addresses as shown above 4 291 4 Command Line Interface Related Commands bridge multicast address show bridge multicast filtering The show bridge multicast filtering User EXEC mode command displays the multicast filtering configuration Syntax show bridge multicast filtering vian id e vian id VLAN ID value Default Setting This command has no default configuration Command Mode User EXEC mode Command Usage There are no user guidelines for this command Example The following example displays the Multicast configuration for VLAN 1 Console show bridge multicast filtering 1 Filtering Enabled VLAN 1 Port Forward Unregistered Forward All Static Status Static Status 1 el Forbidden Filter Forbidden Filter 1 e2 Forward Forward s Forward Forward s 1 e3 Forward d Forward d
316. ess the network via an authentication server Other authentication options include HTTPS for secure management access via the web SSH for secure management access over a Telnet equivalent connection SNMP version 3 IP address filtering for SNMP web Telnet management access and MAC address filtering for port access MAC Address Capacity Support The device supports up to 16K MAC addresses The device reserves specific MAC addresses for system use Self Learning MAC Addresses The device enables automatic MAC addresses learning from incoming packets Automatic Aging for MAC Addresses MAC addresses from which no traffic is received for a given period are aged out This prevents the Bridging Table from 1 2 Description of Software Features 1 overflowing Static MAC Entries User defined static MAC entries are stored in the Bridging Table in addition to the Self Learned MAC addresses VLAN Aware MAC based Switching Packets arriving from an unknown source address are sent to the CPU When source addresses are added to the Hardware Table packets addressed to this address are then forwarded straight to corresponding port MAC Multicast Support Multicast service is a limited broadcast service which allows one to many and many to many connections for information distribution Layer 2 multicast service is where a single frame is addressed to a specific multicast address and copies of the frame transmitted to relev
317. esses and runs the currently active system image unless chosen otherwise To download an image through the TFTP server 1 Ensure that an IP address is configured on one of the device ports and pings can be sent to a TFTP server 2 Ensure that the file to be downloaded is saved on the TFTP server the Image file 3 Enter the command show version to verify which software version is currently running on the device The following is an example of the information that appears Console show version 4 549 SW version x xx xx date xx xxx 2004 time 13 42 41 Boot version X XxX x date x xxx 2003 time 15 12 20 HW version 4 Enter the command show bootvar to verify which system image is currently active The following is an example of the information that appears Console show bootvar 4 321 Images currently available on the Flash Image 1 active selected for next boot Image 2 not active Console 5 Enter the command copy tftp tftp address file name image to copy a new system image to the device When the new image is downloaded it is saved in 2 25 20 Initial Configuration the area allocated for the other copy of system image image 2 as given in the example The following is an example of the information that appears Console copy tftp 176 215 31 3 filel image Accessing file filel on 176 215 31 3 4 315 Loading filel from BITS Mee fl eer ia at ae ee ee Oe 1s Sy a E es ae E
318. ets and FCS octets but excludes framing bits e Received Packets Displays the number of packets received on the interface since the device was last refreshed including bad packets Multicast and Broadcast packets e Broadcast Packets Displays the number of good Broadcast packets received on the interface since the device was last refreshed This number does not include Multicast packets e Multicast Packets Displays the number of good Multicast packets received on the interface since the device was last refreshed e CRC Align Errors Displays the number of CRC and Align errors that have occurred on the interface since the device was last refreshed e Undersize Packets Displays the number of undersized packets less than 64 octets received on the interface since the device was last refreshed Oversize Packets Displays the number of oversized packets over 1518 octets received on the interface since the device was last refreshed e Fragments Displays the number of fragments packets with less than 64 octets excluding framing bits but including FCS octets received on the interface since the device was last refreshed e Jabbers Displays the total number of received packets that were longer than 1518 octets This number excludes frame bits but includes FCS octets that had either a bad Frame Check Sequence FCS with an integral number of octets FCS Error or a bad FCS with a non integral octet Alignment Error
319. etwork authentication properties Command Attributes Port based Authentication State Enables port based authentication on the device The possible field values are e Enable Enables port based authentication on the device e Disable Disables port based authentication on the device 3 110 Port Based Authentication 3 Authentication Method Specifies the authentication method used The possible field values are e None No authentication method is used to authenticate the port RADIUS Port authentication is performed via RADIUS server RADIUS None Port authentication is performed first via the RADIUS server If the port is not authenticated then no authentication method is used and the session is permitted e Guest VLAN Specifies whether the Guest VLAN is enabled on the device The possible field values are Enable Enables using a Guest VLAN for unauthorized ports If a Guest VLAN is enabled the unauthorized port automatically joins the VLAN selected in the VLAN List field e Disable Disables port based authentication on the device This is the default VLAN List Contains a list of VLANs The Guest VLAN is selected from the VLAN list Web Click Security 802 1x System Information System Information Pon Based Anthentication State Erze 2 Authentication Method PADES Nore B Goru VLAN EITE T Figure 3 44 Network Authentication Properties Page
320. ew Related Commands show snmp show snmp groups snmp server user The snmp server user Global Configuration mode command configures a new SNMP Version 3 user To remove a user use the no form of this command Syntax snmp server user username groupname remote engineid string auth md5 password auth sha password auth md5 key md5 des keys auth sha key sha des keys no snmp server user username remote engineid string e username Specifies the name of the user on the host that connects to the agent Range 1 30 characters groupname Specifies the name of the group to which the user belongs Range 1 30 characters engineid string Specifies the engine ID of the remote SNMP entity to which the user belongs The engine ID is a concatenated hexadecimal string Each byte in the hexadecimal character string is two hexadecimal digits Each byte can be separated by a period or colon Range enginelD must contain from 9 through 64 hexadecimal digits auth md5 password Indicates the HMAC MD5 96 authentication level The user should enter a password for authentication and generation of a 4 455 4 Command Line Interface DES key for privacy Range 1 32 characters auth sha password Indicates the HMAC SHA 96 authentication level The user should enter a password for authentication and generation of a DES key for privacy Range 1 32 characters auth md5 key md5 des keys Indicates the HMAC MD5 96 authenti
321. ews console show snmp views Name OID Tree Type user view Te S 67 Leola Included user view 1323 661 2 0 20 7 Excluded user view 1 3 6524 D2 LF Included Related Commands snmp server view show snmp groups The show snmp groups Privileged EXEC mode command displays the configuration of groups Syntax show snmp groups groupname groupname Specifies the name of the group Range 1 30 Default Setting This command has no default configuration 4 467 4 Command Line Interface Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays the configuration of views console show snmp groups Name Security Views Model Level Read Write Notify user group v3 priv Default nn vn managers group v3 priv Default Default nn managers group v3 priv Default mn nn The following table describes significant fields shown above Field Description Name Name of the group Security Model SNMP model in use v1 v2 or v3 Security Level Authentication of a packet with encryption Applicable only to the SNMP v3 security model Views Read Name of the view that enables only viewing the contents of the agent If unspecified all objects except the community table and SNMPv3 user and access tables are available Write Name of the view that enables entering data and managing the contents of the agent Notify Name o
322. example forwards frames with source addresses that are not the supplicant address and sends consecutive traps at intervals of 100 seconds Console config if dotlx single host violation forward trap 100 Related Commands dot1x multiple hosts show dot1x advanced dot1x guest vian The dot1x guest vian Interface Configuration mode command defines a guest VLAN To return to the default configuration use the no form of this command Syntax dot1x guest vian no dot1x guest vian Default Setting No VLAN is defined as a guest VLAN Command Mode Interface Configuration VLAN mode Command Usage Use the dot1x guest vlan enable Interface Configuration mode command to enable unauthorized users on an interface to access the guest VLAN If the guest VLAN is defined and enabled the port automatically joins the guest VLAN when the port is unauthorized and leaves it when the port becomes authorized To be able to join or leave the guest VLAN the port should not be a static member of the guest VLAN Example The following example defines VLAN 2 as a guest VLAN Console Console configure Console config vlan database Console config vlan vlan 2 Console config vlan exit Console config interface vlan 2 Console config if dotlx guest vlan Related Commands dot1x guest vlan enable show dot1x advanced 4 252 802 1x Commands 4 dot1x guest vian enable The dot1x vians guest vian enable Inte
323. ey Specifies the means by which the Dynamic MAC Address Table is sorted The address table can be sorted by address VLAN or interface Web Click Layer 2 Address Table Dynamic Addresses Specify the search type select the sorting method and click Query Dynamic Addresses Addons Aging See Cleat Table c Bey Query by I Pon ta MAC Address r vwo Address Table Son Key 2550n E 3 Current Address Table VLAN ID MAC Figure 3 62 Dynamic Addresses Page CLI The following is an example of the CLI commands used to define dynamic addresses 3 144 Configuring Spanning Tree 3 Console clear bridge 4 284 Console configure Console config interface vlan 2 4 567 Console config if bridge multicast address 01 00 5e 02 02 03 4 279 Console config if bridge multicast forbidden address 0100 5e02 0203 add ethernet 2 e9 4 280 Console config if bridge multicast forward all add ethernet 1 e8 4 281 Console config if bridge multicast forbidden forward all add ethernet 1 e1 4 282 Configuring Spanning Tree The Spanning Tree Algorithm STA can be used to detect and disable network loops and to provide backup links between switches bridges or routers This allows the switch to interact with other bridging devices that is an STA compliant switch bridge or router in your network to ensure that only one route exists between any two stations on the network and provide backup li
324. ey IDs This is the default value Web Select System System Mgmt SNTP Authentication Define the fields and click Apply SNTP Authentication Enable SNIP Actventication M STE Lncryption Key ID Aathentication Key Trusted Key Remove c E ey mon Figure 3 23 SNTP Authentication Page CLI The following is an example of the SNTP authentication commands Console config sntp authentication key 8 md5 ClkKey 4 303 Console config sntp trusted key 8 4 305 Console config sntp authenticate 4 304 Defining SNTP Servers The SNTP Servers Page contains information for enabling SNTP servers as well as adding new SNTP servers In addition the SNTP Servers Page enables the device to request and accept SNTP traffic from a server Command Attributes SNTP Server Displays user defined SNTP server IP addresses Up to eight SNTP servers can be defined 3 73 B Configuring the Switch Poll Interval Indicates whether or not the device polls the selected SNTP server for system time information Encryption Key ID Displays the encryption key identification used to communicate between the SNTP server and device The field range is 1 4294967295 e Preference Indicates the SNTP server providing SNTP system time information The possible field values are Primary Indicates the primary server provides SNTP information Secondary Indicates the backup server provides SNTP information
325. f the device ports and pings can be sent to a TFTP server 2 Ensure that the file to be downloaded the rfb file is saved on the TFTP server 2 26 Startup Menu Functions 2 3 Enter the command show version to verify which boot version is currently running on the device The following is an example of the information that appears Console show version 4 549 SW version x xx xx date xx xxx 2004 time 13 42 41 Boot version X XxX xx date xx xx 2004 time 15 12 20 HW version xx xx xx date xx xxx 2004 time 12 12 20 4 Enter the command copy tftp tftp address file name boot to copy the boot image to the switch The following is an example of the information that appears Console copy tftp 176 215 31 3 6024_boot 10013 rfb 4 315 boot Erasing file Gone PPPELh beeen der err ere er eee rer per err erred rererrereeererr dens 5 Enter the command reload The following message is displayed Console reload 4 541 This command will reset the whole system and disconnect your current session Do you want to continue y n n 6 Enter Y to reboot the switch Startup Menu Functions Additional configuration functions can be performed from the Startup menu To display the Startup menu 1 During the boot process after the first part of the POST is completed press lt Esc gt or lt Enter gt within two seconds after the following message is displayed Autoboot in 2 sec
326. f the view that enables specifying an inform or a trap Related Commands snmp server group show snmp filters The show snmp filters Privileged EXEC mode command displays the configuration of filters Syntax show snmp filters fi tername filtername Specifies the name of the filter Range 1 30 4 468 SNMP Commands 4 Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays the configuration of filters console show snmp filters Name OID Tree Type user filter 1 346 122 1 1 Included user filter L306 E P e 7 Excluded user filter 2236512201222 e L al Included Related Commands snmp server filter show snmp users The show snmp users Privileged EXEC mode command displays the configuration of users Syntax show snmp users username username Specifies the name of the user Range 1 30 Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command 4 469 4 Command Line Interface Example The following example displays the configuration of users console show snmp users Name Group name Auth Method Remote John user group md5 John user group md5 08009009020C0B099C075879 Related Commands snmp server user Spanning Tree Comm
327. face e hh mm ss Current time in hours military format minutes and seconds hh 0 23 mm 0 59 ss 0 59 e day Current day by date in the month 1 31 month Current month using the first three letters by name Jan Dec year Current year 2000 2097 Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example sets the system time to 13 32 00 on the 7th March 2002 Console clock set 13 32 00 7 Mar 2002 Related Commands clock source clock timezone clock summer time clock source The clock source Global Configuration mode command configures an external time source for the system clock Use no form of this command to disable external time source Syntax clock source sntp no clock source sntp SNTP servers Default Setting No external clock source Command Mode Global Configuration mode Command Usage There are no user guidelines for this command 4 300 Clock Commands 4 Example The following example configures an external time source for the system clock Console config clock source sntp Related Commands clock set clock timezone clock summer time clock timezone The clock timezone Global Configuration mode command sets the time zone for display purposes To set the time to the Coordinated Univers
328. fault configuration Command Mode Privileged EXEC mode 4 289 4 Command Line Interface Command Usage There are no user guidelines for this command Example The following example displays the number of addresses present in all VLANs Console show bridge address table count Capacity 8192 Free 8083 Used 109 Secure addresses 2 Static addresses 1 Dynamic addresses 97 Internal addresses 9 Related Commands bridge address show bridge multicast address table The show bridge multicast address table User EXEC mode command displays multicast MAC address or IP address table information Syntax show bridge multicast address table vlan vian ia address mac multicast address ip multicast address format ip format mac e vian id A valid VLAN ID value mac multicast address A valid MAC multicast address jp multicast address A valid IP multicast address format jp mac Multicast address format Can be ip or mac If the format is unspecified the default is mac Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage A MAC address can be displayed in IP format only if it is in the range of 0100 5 00 0000 0100 5e7f ffff 4 290 Address Table Commands 4 Example The following example displays Multicast MAC address and IP address table information Console show bridge multicast address table Vian MAC Addr
329. ffic The eight values are mapped one to one to the Class of Service categories by default but may be configured differently to suit the requirements for specific network applications Layer 2 Data Link layer in the ISO 7 Layer Data Communications Protocol This is related directly to the hardware interface for network devices and passes on traffic based on MAC addresses Link Aggregation See Port Trunk Link Aggregation Control Protocol LACP Allows ports to automatically negotiate a trunked link with LACP configured ports on another device Glossary 613 Glossary Management Information Base MIB An acronym for Management Information Base It is a set of database objects that contains information about a specific device MD5 Message Digest Algorithm An algorithm that is used to create digital signatures It is intended for use with 32 bit machines and is safer than the MD4 algorithm which has been broken MD5 is a one way hash function meaning that it takes a message and converts it into a fixed string of digits also called a message digest Multicast Switching A process whereby the switch filters incoming multicast frames for services for which no attached host has registered or forwards them to all ports contained within the designated multicast VLAN group Network Time Protocol NTP NTP provides the mechanisms to synchronize time across the network The time servers operate in a hierarchical master slave c
330. fic LAG for which Etherlike statistics are displayed Refresh Rate Defines the amount of time that passes before the interface statistics are refreshed The possible field values are e 15 Sec Indicates that the Etherlike statistics are refreshed every 15 seconds e 30 Sec lIndicates that the Etherlike statistics are refreshed every 30 seconds 60 Sec lIndicates that the Etherlike statistics are refreshed every 60 seconds e No Refresh Indicates that the Etherlike statistics are not refreshed Frame Check Sequence FCS Errors Displays the number of FCS errors received on the selected interface 3 136 Creating Trunks 3 e Single Collision Frames Displays the number of single collision frames received on the selected interface e Late Collisions Displays the number of late collision frames received on the selected interface e Excessive Collisions Displays the number of excessive collisions received on the selected interface e Internal MAC Transmit Errors Displays the number of internal MAC transmit errors on the selected interface e Oversize Packets Displays the number of oversized packet errors on the selected interface Internal MAC Receive Errors Number of internal MAC received errors on the selected interface e Receive Pause Frames Displays the number of received paused frames on the selected interface e Transmitted Paused Frames Displays the number of paused frames tran
331. fields for assigning the Default Parameters for the TACACS servers Source IP Address Defines the default device source IP address used for the TACACS session between the device and the TACACS server Key String Defines the default authentication and encryption key for TACACS communication between the device and the TACACS server Timeout for Reply Defines the default time that passes before the connection between the device and the TACACS times out The default is 5 Host IP Address Defines the TACACS Server IP address Priority Defines the order in which the TACACS servers are used The field range is 0 65535 The default is 0 Key String 1 128 Characters Defines the authentication and encryption key for TACACS communications between the device and the TACACS server This key must match the encryption used on the TACACS server Authentication Port 0 65535 Defines the port number via which the TACACS session occurs The default port is port 49 Reply Timeout Defines the amount of time in seconds that passes before the connection between the device and the TACACS times out The field range is 1 1000 seconds Status Indicates the connection status between the device and the TACACS server The possible field values are Connected Indicates there is currently a connection between the device and the TACACS server e Not Connected Indicates there is not currently a connecti
332. figuration use the no form of this command Syntax ip https certificate number no ip https certificate e number Specifies the certificate number Range 1 2 Default Setting Certificate number 1 Command Mode Global Configuration mode 4 601 4 Command Line Interface Command Usage The crypto certificate generate command should be used to generate HTTPS certificates Example The following example configures the active certificate for HTTPS console config ip https certificate 1 Related Commands ip https server ip https port show ip https crypto certificate generate crypto certificate request crypto certificate import show crypto certificate mycertificate show crypto certificate mycertificate The show crypto certificate mycertificate Privileged EXEC mode command displays the SSH certificates of the device Syntax show crypto certificate mycertificate number number Specifies the certificate number Range 1 2 Default Setting e This command has no default configuration Command Mode e Privileged EXEC mode Command Usage e There are no user guidelines for this command 4 602 Web Server Commands 4 Example The following example displays the certificate console show crypto certificate mycertificate 1 eseni BEGIN CERTIFICATE dHmUgUm9vdCBDZXJ 0aWZpZXIwXDANBgkqhkiG9w0 BAQEFAANLADBIAkKEAp4HS nnH xQSGA2 f kRBwU2XIxb7n8VPsTmlxyJ1t1llalGaqchfMqqe0kmfhcoH
333. figures the spanning tree path cost for a port To return to the IC 4 477 configuration use the no form of this command spanning tree Configures port priority To return to the default configuration use IC 4 478 port priority the no form of this command 4 470 Spanning Tree Commands 4 Table 4 27 Spanning Tree Commands Command Function Mode Page spanning tree Enables PortF ast mode In PortF ast mode the interface is IC 4 479 portfast immediately put into the forwarding state upon linkup without waiting for the standard forward time delay To disable PortF ast mode use the no form of this command Spanning tree Overrides the default link type setting determined by the duplex IC 4 480 link type mode of the port and enables Rapid Spanning Tree Protocol RSTP transitions to the forwarding state To return to the default configuration use the no form of this command spanning tree Sets the default path cost method To return to the default GC 4 481 pathcost method configuration use the no form of this command spanning tree bpdu Defines BPDU handling when the spanning tree is disabled GC 4 482 globally or on a single interface To return to the default configuration use the no form of this command clear spanning tree Restarts the protocol migration process forces renegotiation with PE 4 483 detected protocols ne
334. fine the MSTP instance settings using the MSTP Instance Settings Page Note To ensure that the MSTI maintains connectivity across the network you must configure a related set of bridges with the same MSTI settings Command Attributes Instance ID Specifies the VLAN group to which the interface is assigned Included VLAN Maps the selected VLANs to the selected instance Each VLAN belongs to one instance Bridge Priority Specifies the selected spanning tree instance device priority The field range is 0 61440 Designated Root Bridge ID Indicates the ID of the bridge with the low est path cost to the instance ID Root Port Indicates the selected instance s root port Root Path Cost Indicates the selected instance s path cost Bridge ID Indicates the bridge ID of the selected instance Remaining Hops Indicates the number of hops remaining to the next destination Web Click Spanning Tree STA MSTP Instance Settings Define the fields and Click Apply 3 154 MSTP Instance Settings Vien inmance Contqueton Instance 10 a Ea Laldge Priotiny 61440 in stops of 1096 755 Designated Root Bridge ID Rost Port Rost Path Cou o Heldge 10 Remaining Hops x Figure 3 67 MSTP Instance Settings Page Defining Spanning Tree 3 CLI The following is an example of the MSTP Instance Settings commands Console config spanning tree mst configuration 4 487 Console config m
335. form of this command Syntax mac access list name no mac access list name e name Specifies the name of the ACL Default Setting The default for all ACLs is deny all Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example shows how to create a MAC ACL Console config mac access list macl acll Console config mac al Related Commands permit MAC deny MAC show access lists 4 271 4 Command Line Interface service acl match permit MAC The permit MAC Access List Configuration mode command defines permit conditions of an MAC ACL Syntax permit any host source source wildcara any destination destination wildcard vlan vian id cos cos cos wildcard ethtype eth type source Specifies the source MAC address of the packet source wildcard Specifies wildcard bits to be applied to the source MAC address Use 1s in bit positions to be ignored destination Specifies the MAC address of the host to which the packet is being sent destination wildcard Specifies wildcard bits to be applied to the destination MAC address Use 1s in bit positions to be ignored e vian id Specifies the ID of the packet VLAN Range 0 4095 cos Specifies the Class of Service CoS for the packet Range 0 7 cos wildcard Specifies wildcard bits to be applied to the CoS e eth type Specifies
336. forward all show bridge multicast filtering bridge multicast forbidden forward all The bridge multicast forbidden forward all Interface Configuration VLAN mode command forbids a port to be a forward all multicast port To restore the default configuration use the no form of this command Syntax bridge multicast forbidden forward all add remove ethernet interface list port channel port channel number list no bridge multicast forbidden forward all add Forbids forwarding all multicast packets remove Does not forbid forwarding all multicast packets e interface list Separates nonconsecutive Ethernet ports with a comma and no spaces a hyphen is used to designate a range of ports port channel number list Separates nonconsecutive port channels with acomma and no spaces a hyphen is used to designate a range of port channels Default Setting This setting is disabled Command Mode Interface Configuration VLAN mode 4 282 Address Table Commands 4 Command Usage IGMP snooping dynamically discovers multicast device ports When a multicast device port is discovered all the multicast packets are forwarded to it unconditionally This command prevents a port from becoming a multicast device port Example The following example configures the device to forbid all forwarding of Multicast packets to 1 e1 with VLAN 2 Console config interface vlan 2 Console config if bridge multicast forbid
337. g spanning tree mst configuration ocnsole config mst instance 1 add vlan 10 20 Related Commands spanning tree mst priority spanning tree mst max hops spanning tree mst port priority spanning tree mst cost spanning tree mst configuration name mst revision mst show mst exit mst abort mst show spanning tree name mst The name MST Configuration mode command defines the configuration name To return to the default setting use the no form of this command Syntax name string e string MST configuration name Case sensitive Range 1 32 characters Default Setting The default name is a bridge ID Command Mode MST Configuration mode 4 489 4 Command Line Interface Command Usage There are no user guidelines for this command Example The following example defines the configuration name as region1 console config spanning tree mst configuration console config mst name region 1 Related Commands spanning tree mst priority spanning tree mst max hops spanning tree mst port priority spanning tree mst cost spanning tree mst configuration instance mst revision mst show mst exit mst abort mst show spanning tree revision mst The revision MST configuration command defines the configuration revision number To return to the default configuration use the no form of this command Syntax revision value no revision e value Configuration revision n
338. gation effect for all applicable commands Using Command History The CLI maintains a history of commands that have been entered You can scroll back through the history of commands by pressing the up arrow key Any command displayed in the history list can be executed again or first modified and then executed Using the show history command displays a longer list of recently executed commands Understanding Command Modes The command set is divided into Exec and Configuration classes Exec commands generally display information on system status or clear statistical counters Configuration commands on the other hand modify interface parameters or enable certain switching functions These classes are further divided into different modes Available commands depend on the selected mode You can always enter a question mark at the prompt to display a list of the commands available for the 4 226 Entering Commands 4 current mode The command classes and associated modes are displayed in the following table Table 4 1 Command Modes Class Mode Exec Normal Privileged Configuration Global Access Control List Interface Line Multiple Spanning Tree VLAN Database You must be in Privileged Exec mode to access the Global configuration mode You must be in Global Configuration mode to access any of the other configuration modes Exec Commands When you open a new console session on the switch w
339. ge power inline Configures the administrative mode of inline power on an ICE 4 399 interface power inline Adds a comment or description of the powered device type to ICE 4 396 powered device enable the user to remember whatis attached to the interface To remove the description use the no form of this command power inline priority Configures the inline power management priority of the interface ICE 4 399 To return to the default configuration use the no form of this command 4 398 Power over Ethernet Commands 4 Table 4 22 Power Over Ethernet Commands Command Function Mode Page power inline Configures the threshold for initiating inline power usage alarms GC 4 401 usage threshold To return to the default configuration use the no form of this command power inline traps Enables inline power traps To disable inline power traps use the GC 4 402 enable no form of this command show power inline Displays the information about inline power UE 4 402 power inline The port inline Interface Configuration Ethernet mode command configures the administrative mode of inline power on an interface Syntax power inline auto never e auto Enables the device discovery protocol and if found supplies power to the device never Disables the device discovery protocol and stops supplying power to the device Default Setting The device discovery protocol is enabled
340. ge Before configuring policies for classes whose match criteria are defined in a class map use the policy map Global Configuration mode command to specify the name of the policy map to be created or modified Class policies in a policy map can only be defined if match criteria has already been defined for the classes Use the class map Global Configuration and match Class map Configuration commands to define the match criteria of a class Only one policy map per interface per direction is supported A policy map can be applied to multiple interfaces and directions Example The following example creates a policy map called policy1 and enters the Policy map Configuration mode Console config policy map policyl Console config pmap Related Commands show policy map service policy class class The class Policy map Configuration mode command defines a traffic classification and enters the Policy map Class Configuration mode To remove a class map from the policy map use the no form of this command 4 410 QoS Commands 4 Syntax class class map name access group aci name no class class map name class map name Specifies the name of an existing class map If the class map does not exist a new class map will be created under the specified name acl name Specifies the name of an IP or MAC ACL Default Setting No policy map is defined Command Mode Policy map Configuration mode Command Usage Bef
341. ge spanning tree priority spanning tree disable spanning tree cost spanning tree port priority spanning tree portfast spanning tree link type spanning tree pathcost method spanning tree bpdu clear spanning tree detected protocols spanning tree mst priority spanning tree mst max hops spanning tree mst port priority spanning tree mst cost spanning tree mst configuration instance mst name mst revision mst show mst exit mst abort mst spanning tree guard root 4 509 4 Command Line Interface SSH Commands Table 4 28 SSH Commands Command Function Mode Page ip ssh port Specifies the port to be used by the SSH server To return to the GC 4 510 default configuration use the no form of this command ip ssh server Enables the device to be configured from a SSH server To disable GC 4 511 this function use the no form of this command crypto key generate Generates DSA key pairs GC 4 511 dsa crypto key generate Generates RSA key pairs GC 4 512 rsa ip ssh pubkey auth Enables public key authentication for incoming SSH sessions To GC 4 513 disable this function use the no form of this command crypto key Enters the SSH Public Key chain Configuration mode The mode GC 4 514 pubkey chain ssh is used to manually specify other device public keys such as SSH client public keys user key Specifies which SSH public key is manually configured To
342. ge the switch from a remote network a static route must be configured which is an IP address to where packets are sent when no entries are found in the device tables The configured IP address must belong to the same subnet as one of the device IP interfaces To configure a static route enter the command at the system prompt as shown in the following configuration example where 101 1 1 2 is the specific management station Console configure Console config interface vlan 1 4 567 Console config if ip address 100 1 1 1 255 255 255 0 4 359 Console config if exit 4 560 Console config ip default gateway 100 1 1 10 4 361 Gateway IP Address Gateway IP Type Activity Status Address 2 17 20 Initial Configuration iO Fide Static Active IP Address Interface Type 10 7 1 192 24 VLAN1 static 10 7 2 192 24 VLAN2 DHCP User Name A user name is used to manage the device remotely for example through SSH Telnet or the Web interface To gain complete administrative super user control over the device the highest privilege level 15 must be specified Note Only the administrator super user with the highest privilege level 15 is allowed to manage the device through the Web browser interface For more information about the privilege level see the Command Line Interface The configured user name is entered as a login name for remote management sessions To configure user name and privilege level enter the comma
343. gement is SNMP 2 Hesification Recipient Recipies Notification Community Netification UOP Fiter ory 5 Shing Version Port Name Timeout Retiles Modity Remove 1 Traps Z r r raresry ak veo SHMPY3 Notification Recipient Recipients Notification User Security UDP Filter sP Tes Hane Lacet Pon Heme Timeout Rates Edit Remove r 1 Teaps oc aera nie muon Pree sony ww Pater Figure 3 33 SNMP Notification Receiver Page 3 88 Configuring SNMP 3 CLI The following is an example of the SNMP Recipient commands Console config snmp server host 10 1 1 1 management 2 4 459 3 89 B Configuring the Switch Configuring User Authentication You can restrict management access to this switch using the following options e Passwords Configure the password for the current user e Authentication Settings Use remote authentication to configure access rights HTTPS Settings Provide a secure web connection SSH Settings Provide a secure shell for secure Telnet access e Port Security Configure secure addresses for individual ports e 802 1x Use IEEE 802 1x port authentication to control access to specific ports e IP Filter Filters management access to the web SNMP or Telnet interface Defining Local Users Passwords Network administrators can define users passwords and access levels for users using the Local Users Passwords Page Command Attributes e User Name Displays the user
344. ggregate whole with no per flow settings CoS is usually related to the 802 1p service that classifies flows according to their Layer 2 priority as set in the VLAN header QoS refers to Layer 2 traffic and above QoS handles per flow settings even within a single traffic class The QoS facility involves the following elements e Access Control Lists ACLs Used to decide which traffic is allowed to enter the system and which is to be dropped Only traffic that meets this criteria are subject to CoS or QoS settings ACLs are used in QoS and network security e Traffic Classification Classifies each incoming packet as belonging to a given traffic class based on the packet contents and or the context e Assignment to Hardware Queues Assigns incoming packets to forwarding queues Packets are sent to a particular queue for handling as a function of the traffic class to which they belong as defined by the classification mechanism Traffic Class Handling Attributes Applies QoS CoS mechanisms to different classes including e Bandwidth Management e Shaping Rate Limiting e Policing Access Control Lists ACLs inspect incoming packets and classify them into logical groups based on 3 174 Configuring Quality of Service 3 various criteria ACL groups have specific actions that are carried out on every packet that is classified to the group ACLs enable actions which include e Forward e Deny e Deny and disab
345. ght Saving USA European ode oe Time Set Otteet E mn Freee a onum A tT To GSS rnm F e GREDE E necim Frew Sox oo eo ee mc os wa oo ee re E onea Ls lt ae Configuring System Time 3 Figure 3 21 Clock Time Zone Page CLI The following is an example of the system clock commands Console clock set 13 32 00 7 Mar 2002 4 299 Console configure Console config clock source sntp 4 300 Console config clock timezone 6 zone CST 4 301 Console config clock summer time recurring first sun apr 2 00 last sun oct 2 00 4 302 3 69 B Configuring the Switch Configuring SNTP Simple Network Time Protocol SNTP allows the switch to set its internal clock based on periodic updates from a time server SNTP or NTP Maintaining an accurate time on the switch enables the system log to record meaningful dates and times for event entries You can also manually set the clock using the CLI If the clock is not set the switch will only record the time from the factory default set at the last bootup The device can poll the following server types for the server time e Unicast e Anycast e Broadcast Time sources are established by stratums Stratums define the accuracy of the reference clock The higher the stratum where zero is the highest the more accurate the clock is The device receives time from stratum 1 and above The following is an example of stratums e Stratum 0 A real time clock such
346. gotiation on that port Half duplex mode can be set only for ports operating at 10 Mbps or 100 Mbps Example The following example configures the duplex operation of Ethernet port 1 e5 to full duplex operation Console config interface ethernet 1 e5 Console config if duplex full Related Commands shutdown speed negotiation flowcontrol mdix 4 327 4 Command Line Interface back pressure show interfaces configuration show interfaces status negotiation The negotiation Interface Configuration Ethernet port channel mode command enables auto negotiation operation for the speed and duplex parameters of a given interface To disable auto negotiation use the no form of this command Syntax negotiation capability1 capability2 capability5 no negotiation e capability Specifies the capabilities to advertise Possible values 10h 10f 100h 100f 1000f Default Setting Auto negotiation is enabled If unspecified the default setting is to enable all capabilities of the port Command Mode Interface Configuration Ethernet port channel mode Command Usage If capabilities were specified when auto negotiation was previously entered not specifying capabilities when currently entering auto negotiation overrides the previous configuration and enables all capabilities Example The following example enables auto negotiation on Ethernet port 1 e5 Console config interface ethernet 1 e5 Co
347. group priviledged EXEC command displays protocols groups information Syntax show vlan subnets group Default Configuration This command has no default configuration Command Mode Priviledged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays protocols groups information console show vlan protocols groups Protocol Encapsulation Group 0x800 IP Ethernet 1 0x806 ARP Ethernet 1 0x86dd IPv6 Ethernet 2 0x8898 Ethernet 3 Related Commands map protocol protocols group Web Server Commands Table 4 34 Web Server Commands Command Function Mode Page ip http server Enables configuring the device from a browser To disable this GC 4 595 function use the no form of this command ip http port Specifies the TCP port to be used by the Web browser interface GC 4 596 To return to the default configuration use the no form of this command ip https server Enables configuring the device from a secured browser To return GC 4 596 to the default configuration use the no form of this command 4 594 Web Server Commands 4 Table 4 34 Web Server Commands Command Function Mode Page ip https port Specifies the TCP port used by the server to configure the device GC 4 597 through the secured Web browser To return to the default configuration use the no form of this command crypto
348. guidelines for this command Example The following example specifies the default authentication method when accessing a higher privilege level from a console Console config line console Console config line enable authentication default Related Commands show authentication methods ip http authentication The ip http authentication Global Configuration mode command specifies authentication methods for HTTP server users To return to the default configuration use the no form of this command Syntax ip http authentication method method2 no ip http authentication 4 259 4 Command Line Interface e method method2 Specify at least one from the following table Keyword Description local Uses the local username database for authentication none Uses no authentication radius Uses the list of all RADIUS servers for authentication tacacs Uses the list of all TACACS servers for authentication Default Setting The local user database is checked This has the same effect as the command ip http authentication ocal Command Mode Global Configuration mode Command Usage The additional methods of authentication are used only if the previous method returns an error not if it fails To ensure that the authentication succeeds even if all methods return an error specify none as the final method in the command line Example The following example configures the HTTP authenticat
349. guration use the no form of this command tacacs server Configures the source IP address to be used for communication GC 4 554 source ip with TACACS servers To return to the default configuration use the no form of this command show tacacs Displays configuration and statistical information about a PE 4 555 TACACS server 4 551 4 Command Line Interface tacacs server host The tacacs server host Global Configuration mode command specifies a TACACS host To delete the specified name or address use the no form of this command Syntax tacacs server host ip address hostname single connection port port number timeout timeout key key string source source priority priority no tacacs server host ip address hostname ip address P address of the TACACS server hostname Host name of the TACACS server Range 1 158 characters single connection Indicates a single connection Rather than have the device open and close a TCP connection to the daemon each time it must communicate the single connection option maintains a single open connection between the device and the daemon port number Specifies a server port number Range 0 65535 e timeout Specifies the timeout value in seconds Range 1 30 e key string Specifies the authentication and encryption key for all TACACS communications between the device and the TACACS server This key must match the encrypt
350. has no default configuration Command Mode Global Configuration mode Command Usage Eight aggregated links can be defined with up to eight member ports per port channel The aggregated links valid IDs are 1 8 Example The following example enters the context of port channel number 1 Console config interface port channel 1 Related Commands interface range port channel show interfaces port channel interface range port channel The interface range port channel Global Configuration mode command enters the interface configuration mode to configure multiple port channels Syntax interface range port channel port channel range all port channel range List of valid port channels to add Separate nonconsecutive port channels with a comma and no spaces A hyphen designates a range of port channels e all All valid port channels Default Setting This command has no default configuration Command Mode Global Configuration mode Command Usage Commands under the interface range context are executed independently on each interface in the range 4 394 Port Channel Commands 4 Example The following example groups port channels 1 2 and 6 to receive the same command Console config interface range port channel 1 2 6 Related Commands interface port channel show interfaces port channel channel group The channel group Interface Configuration Ethernet mode command associate
351. he Enable Receive Broadcast Servers Update fields are enabled the system time is set according the Anycast server time information The possible values are Enable Enables the device to receive Anycast server updates Disable Disables the device from receiving Anycast server updates Enable Receive Unicast Servers Updates Defines whether or not the device polls the SNTP server for Unicast server time information If the Enable Receive Broadcast Servers Updates Enable Receive Anycast Servers Updates and Enable Receive Unicast Servers Updates fields are all enabled the system time is set according the Unicast server time information The possible values are Enable Enables the device to receive Unicast server updates Disable Disables the device from receiving Unicast server updates Enable Poll Unicast Servers Defines whether or not the device sends SNTP Unicast forwarding information to the SNTP server The possible values are Enable Enables the device to receive Poll Unicast server updates Disable Disables the device from receiving Poll Unicast server updates 3 71 B Configuring the Switch Web Select System System Mgmt SNTP Configuration Define the fields and click Apply SNTP Configuration Poll baterval faa Enable Receive Broadcast Servers Updates M Enable Receive Anycast Servers Updates Enable Receive Unicast Servers Updates M Enable Pell Unicast Servers n
352. he access profile name can contain up to 32 characters e Current Active Access Profile Defines the access profile currently active e Remove Removes the selected access profile The possible field values are Checked Removes the selected access profile e Unchecked Maintains the access profiles e Rule Priority Defines the rule priority When the packet is matched to a rule user groups are either granted permission or denied device management access The rule number is essential to matching packets to rules as packets are matched on a first fit basis The rule priorities are assigned in the Profile Rules Page Management Method Defines the management method for which the rule is defined Users with this access profile can access the device using the management method selected The possible field values are All Assigns all management methods to the rule e Telnet Assigns Telnet access to the rule If selected users accessing the 3 94 Defining Access Profiles 3 device using Telnet meeting access profile criteria are permitted or denied access to the device e Secure Telnet SSH Assigns SSH access to the rule If selected users accessing the device using Telnet meeting access profile criteria are permitted or denied access to the device e HTTP Assigns HTTP access to the rule If selected users accessing the device using HTTP meeting access profile criteria are permitted or denied ac
353. he device and the TACACS server This key must match the encryption used on the TACACS daemon Range 0 128 characters Default Setting Empty string Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example sets the authentication encryption key console config tacacs server key alcatel s Related Commands tacacs server host tacacs server timeout tacacs server source ip show tacacs tacacs server timeout The tacacs server timeout Global Configuration mode command sets the interval during which the device waits for a TACACS server to reply To return to the default configuration use the no form of this command 4 553 4 Command Line Interface Syntax tacacs server timeout timeout no tacacs server timeout e timeout Specifies the timeout value in seconds Range 1 30 Default Setting 5 seconds Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example sets the timeout value to 30 console config tacacs server timeout 30 Related Commands tacacs server host tacacs server key tacacs server source ip show tacacs tacacs server source ip The tacacs server source ip Global Configuration mode command configures the source IP address to be used for communication with TACACS servers To return to the default configuration us
354. he network Guest VLANs Provides limited network access to authorized ports If a port is denied network access via port based authorization but the Guest VLAN is enabled the port receives limited network access For example a network administrator can use Guest VLANs to deny network access via port based authentication but grant Internet access to unauthorized users Unauthenticated VLANS Are available to users even if the ports attached to the VLAN are defined as unauthorized When configuring port based authentication ensure the following The switch must have an IP address assigned RADIUS authentication must be enabled on the switch and the IP address of the RADIUS server specified Each switch port must be set to dot1x Auto mode Each client that needs to be authenticated must have dot1x client software installed and properly configured The RADIUS server and 802 1x client support EAP The switch only supports EAPOL in order to pass the EAP packets from the server to the client The RADIUS server and client also have to support the same EAP authentication type MD5 Some clients have native support in Windows otherwise the dot1x client must support it Defining Network Authentication Properties The Network Authentication Properties Page allows network managers to configure network authentication parameters In addition Guest VLANs are enabled from the Network Authentication Properties Page To define the n
355. he remote management station and should be defined to enable the device to receive informs Example The following example configures an SNMPv3 user John in group user group console config snmp server user John user group Related Commands show snmp users 4 456 SNMP Commands 4 snmp server engineid local The snmp server engineid local Global Configuration mode command specifies the Simple Network Management Protocol SNMP engine ID on the local device To remove the configured engine ID use the no form of this command Syntax snmp server engineid local engineid string default no snmp server engineid local engineid string Specifies a character string that identifies the engine ID Range engine ID must contain from 9 through 64 hexadecimal digits default The engine ID is created automatically based on the device MAC address Default Setting The engine ID is not configured If SNMPv3 is enabled using this command and the default is specified the default engine ID is defined per standard as e First 4 octets first bit 1 the rest is IANA Enterprise number 674 Fifth octet set to 3 to indicate the MAC address that follows e Last 6 octets MAC address of the device Command Mode Global Configuration mode Command Usage To use SNMPv3 you have to specify an engine ID for the device You can specify your own ID or use a default string that is generated using the MAC address
356. he session is blocked Local RADIUS None Authentication first occurs locally If authentication cannot be verified locally the RADIUS server authenticates the management method If the RADIUS server cannot authenticate the management method the session is permitted RADIUS Local None Authentication first occurs at the RADIUS server If authentication cannot be verified at the RADIUS server the session is authenticated locally If the session cannot be authenticated locally the session is permitted Web Click System WebViewMgmt Authentication Authentication Mapping define the fields and click Apply Authentication Mapping Console Telset Network Detour Secme Telnet SS Far Comma a Secme TTP Op sasi Methods Selected Methods e _ TACACS Figure 3 40 Authentication Mapping Page CLI The following is an example of the CLI commands used for mapping authentication mapping Console config aaa authentication enable default enable 4 257 3 101 3 Configuring the Switch Defining RADIUS Settings Remote Authorization Dial In User Service RADIUS servers provide additional security for networks RADIUS servers provide a centralized authentication method for web access Default parameters are user defined and are applied to newly defined RADIUS servers If new default parameters are not defined the system default values are applied to newly defined RADIUS servers
357. header VLANs MAC Based VLANs Packets are classified according to MAC address Description of Software Features The switch provides a wide range of advanced performance enhancing features Flow control eliminates the loss of packets due to bottlenecks caused by port saturation Broadcast storm suppression prevents broadcast traffic storms from engulfing the network Port based and protocol based VLANs plus support for automatic GVRP VLAN registration provide traffic security and efficient use of network bandwidth CoS priority queueing ensures the minimum delay for moving real time multimedia data across the network While multicast filtering provides support for real time network applications Some of the management features are briefly described below Configuration Backup and Restore You can save the current configuration settings to a file on a TFTP server and later download this file to restore the switch configuration settings Authentication This switch authenticates management access via the console port Telnet or web browser User names and passwords can be configured locally or can be verified via a remote authentication server i e RADIUS or TACACS Port based and MAC based authentication is also supported via the IEEE 802 1x protocol This protocol uses the Extensible Authentication Protocol over LANs EAPOL to request user credentials from the 802 1x client and then verifies the client s right to acc
358. her the port control is Force Unauthorized and the port link is down or the port control is Auto but a client has not been authenticated via the port e Not in Auto Mode Indicates that the port control is Forced Authorized and clients have full port access e Single host Lock Indicates that the port control is Auto and a single client has been authenticated via the port e No Single Host Indicates that Multiple Host is enabled Number of Violations Indicates the number of packets that arrived on the interface in single host mode from a host whose MAC address is not the supplicant MAC address Web Click Security 802 1x Multiple Hosts define the fields and click Apply 3 114 Port Based Authentication 3 Muttipte Hosts teeta TE a a p Pont Muiipte Hes ioen TOPE Pabuanoy StH Muinas Modit Aaen Cree ti LA eo Figure 3 46 Multiple Hosts Page CLI The following is an example of the Multiple Hosts CLI commands Console config if dot1lx multiple hosts 4 250 Console config if dotlx single host violation forward trap 100 4 251 Defining Authentication Hosts The Authenticated Hosts Page contains a list of authenticated users The Authenticated Hosts Page contains the following fields User Name Lists the supplicants that were authenticated and are permitted on each port Port Displays the port number Session Time Displays the amount of time in seconds
359. hich the LACP parameters are displayed e Port Displays the port number to which timeout and priority values are assigned e Port Priority Displays the LACP priority value for the port The field range is 1 65535 e LACP Timeout Displays the administrative LACP timeout Web Click Interface Interface Configuration LACP Configuration Define the port LACP parameters and click Apply B Interface LACP Configuration remens LACE System Priority Unit No fa v raees z Pon Peat Priordy LACP Timeout Modify Sis 1 oe z Deer nwon Eo Sestry Figure 3 54 Interface LACP Configuration Page 3 131 B Configuring the Switch CLI The following is an example of the LACP interface CLI commands Console config lacp system priority 120 4 371 Console config interface ethernet 1 e6 4 323 Console config if lacp port priority 247 4 372 Console config if lacp timeout long 4 373 Enabling Storm Control Storm control limits the amount of Multicast Unicast and Broadcast frames accepted and forwarded by the device When Layer 2 frames are forwarded Broadcast and Multicast frames are flooded to all ports on the relevant VLAN This occupies bandwidth and loads all nodes on all ports Broadcast storms may occur when a device on your network is malfunctioning or if application programs are not well designed or properly configured If there is too much broadcast traffic on your network performance can
360. his command enables the user to configure the internal usage VLAN of a port If an internal usage VLAN is not configured and the user wants to configure an IP interface an unused VLAN is selected by the software e Ifthe software selected a VLAN for internal use and the user wants to use that VLAN as a static or dynamic VLAN the user should do one of the following e Remove the IP interface e Use this command to explicitly configure a different VLAN as the internal usage VLAN Create the VLAN and recreate the IP interface Example The following example reserves an unused VLAN 1236 as the internal usage VLAN of ethernet port 1 e8 console config console config interface ethernet 1 e8 console config if ip internal usage vlan 1236 4 579 4 Command Line Interface Related Commands show vlan internal usage show vlan The show vlan Privileged EXEC mode command displays VLAN information Syntax show vlan id vian id name vian name e vian id specifies a VLAN ID vian name Specifies a VLAN name string Range 1 32 characters Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Type other dynamic static static static static static static Example The following example displays all VLAN information console show vlan VLAN Name Ports 1 default el e2
361. how vlan subnets group switchport general map subnets group vian show vlan subnets group The show vlan subnets group priviledged EXEC command displays subnets groups information 4 591 4 Command Line Interface Syntax show vian subnets group Default Configuration This command has no default configuration Command Mode Priviledged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays subnets groups information console show vlan subnets group MAC Prefix Group 1742 16 10 200 A90 ADDU i 1724 16 20 255 2255 0255 0 2 Related Commands map subnet subnets group switchport general map subnets group vlan map protocol protocols group The map protocol protocols group VLAN Configuration mode command maps a protocol to a group of protocols Use the no form of this command to delete the map Syntax map protocol protocol encapsulation protocols group group no map iprotocol encapsulation protocol Specifies the 16 bits protocol number or one of the reserved names that are defined in the usage guidelines Range 0x0000 0x0600 group Specifies the group number of an associated group of protocols Range 1 2147483647 encapsulation Specifies one of the following values ethernet rfc1042 snap8021H IlcOther snapOther If no option is indicated the default is ethernet Default Configuration This command has no default configuratio
362. ible field values are e Checked Removes the selected user e Unchecked Maintains the list of users e Authentication Method Defines the SNMP Authentication Method e Authentication Key Defines the HMAC MD5 96 or HMAC SHA 96 authentication level The authentication and privacy keys are entered to define the authentication key If only authentication is required 16 bytes are defined If both privacy and authentication are required 32 bytes are defined Each byte in hexadecimal character strings is two hexadecimal digits Each byte can be separated by a period or a colon e Privacy Key Defines the privacy key LSB If only authentication is required 20 bytes are defined If both privacy and authentication are required 36 bytes are defined Each byte in hexadecimal character strings is two hexadecimal digits Each byte can be separated by a period or colon e Password Defines the password for the group member Web Click SNMP SNMPv3 Users Click Add to configure a user name In the New User page define a name and assign it to a group then click Apply to save the configuration and return to the User Name list To delete a user check the box next to the user name then click Delete To change the assigned group of a user click Change Group in the Actions column of the users table and select the new group 3 82 Configuring SNMP 3 User Name Group Name Engine ID Asthentcation Medity Remove No Authertes
363. icates that the Interface statistics are refreshed every 30 seconds 60 Sec lIndicates that the Interface statistics are refreshed every 60 seconds e No Refresh Indicates that the Interface statistics are not refreshed Total Bytes Octets Displays the number of octets received on the selected interface Unicast Packets Displays the number of Unicast packets received on the selected interface Multicast Packets Displays the number of Multicast packets received on the selected interface Broadcast Packets Displays the number of Broadcast packets received on the selected interface Packets with Errors Displays the number of error packets received from the selected interface Packet with Errors counts all errors without the CRC errors Total Bytes Octets Displays the number of octets transmitted from the selected interface Unicast Packets Displays the number of Unicast packets transmitted from the selected interface Multicast Packets Displays the number of Multicast packets transmitted from the selected interface Broadcast Packets Displays the number of Broadcast packets transmitted from the selected interface Etherlike Statistics The Etherlike Statistics Page contains the following fields Interface Indicates the device for which statistics are displayed The possible field values are e Port Defines the specific port for which Etherlike statistics are displayed e LAG Defines the speci
364. ication Code HMAC MD5 HMAC SHA1 Related Commands ip ssh port ip ssh server show crypto key mypubkey The show crypto key mypubkey Privileged EXEC mode command displays the SSH public keys on the device Syntax show crypto key mypubkey rsa dsa e rsa Indicates the RSA key e dsa Indicates the DSA key 4 518 SSH Commands 4 Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays the SSH public RSA keys on the device console show crypto key mypubkey rsa RSA key data 005C300D 06092A86 4886F70D 01010105 00034B00 30480241 00C5E23B 55D6AB22 04AEF1BA A54028A6 9ACC01C5 129D99E4 64CAB820 847EDAD9 DF0B4E4C 73A05DD2 BD62A8A9 FA603DD2 E2A8A6F8 98F76E28 D58AD221 B583D7A4 71020301 87685768 Fingerprint Hex 77 C7 19 85 98 19 27 96 C9 CC 83 C5 78 89 F8 86 Fingerprint Bubble Babble yteriuwt jgkljhglk yewiury hdskjfryt gfhkjglk Related Commands crypto key generate dsa crypto key generate rsa ip ssh pubkey auth crypto key pubkey chain ssh user key key string show crypto key pubkey chain ssh show crypto key pubkey chain ssh The show crypto key pubkey chain ssh Privileged EXEC mode command displays SSH public keys stored on the device Syntax show crypto key pubkey chain ssh username username fingerprint bubble babble hex username Spe
365. ice Provides device information Informational Provides device information Debug Provides debugging messages e Description Displays the log message text ry Web Click System Mgmt Logs Memory Logs 3 59 B Configuring the Switch ag inten top Tima Savei Desctpten i VDT Otte 0000410 Emor AAAS AUTHFAIL Aurhestication falied for hap source 10 6 39 20 2 2147482612 Ottan2000 0140 12 Er MAAAEAUTHFAL Authentication fates for tp sace 106 33 16 I 2147483647 Otte 200001 45S Enor MAME AUTHFAL Authenticate faded fer hmp source 10639 16 Figure 3 18 Memory Logs Page CLI The following is an example of the CLI commands used to view memory logs 3 60 Copying Files 3 Console show logging 4 529 Logging is enabled Console logging level debugging Console Messages 0 Dropped severity Buffer logging level debugging Buffer Messages 11 Logged 200 Max File logging level notifications File Messages 0 Dropped severity Syslog server 192 180 2 27 logging errors Messages 6 Dropped severity Syslog server 192 180 2 28 logging errors Messages 6 Dropped severity 2 messages were not logged resources Application filtering control Application Event Status AAA Login Enabled File system Copy Enabled File system Delete Rename Enabled Management ACL Deny Enabled Buffer log Aug 2004 15 41 43 LINK 3 UPDOWN Interface FastEthernet0 0 changed state to up Aug 20
366. ice test has failed For example a port could not be enabled and cannot be used to deliver power to the powered device e Testing Indicates the powered device is being tested For example a powered device is tested to confirm it is receiving power from the power supply Searching Indicates that the device is currently searching for a powered device Searching is the default PoE operational status e Fault Indicates that the device has detected a fault on the powered device For example the powered device memory could not be read e Priority Level Determines the port priority if the power supply is low The port power priority is used if the power supply is low The field default is low For example if the power supply is running at 99 usage and port 1 is prioritized as high but port 3 is prioritized as low port 1 is prioritized to receive power and port 3 may be denied power The possible field values are e Low Defines the PoE priority level as low e High Defines the PoE priority level as high Critical Defines the PoE priority level as Critical This is the highest PoE priority level e Power Consumption Indicates the amount of power assigned to the powered device connected to the selected interface Devices are classified by the powered device and the devices uses the classification information The field values are represented in Watts The possible field values are 0 44 12 95 Indicates th
367. ients The SNMPv3 Notification Recipient table contains the following fields e Recipient IP Displays the IP address to which the traps are sent 3 87 B Configuring the Switch Notification Type Displays the type of notification sent The possible field values are Trap Indicates that traps are sent Inform Indicates that informs are sent User Name Displays the user to which SNMP notifications are sent Security Level Displays the means by which the packet is authenticated The possible field values are No Authentication Indicates that the packet is neither authenticated nor encrypted e Authentication Indicates that the packet is authenticated UDP Port The UDP port used to send notifications The field range is 1 65535 The default is 162 Filter Name Includes or excludes SNMP filters Timeout The amount of time seconds the device waits before resending informs The field range is 1 300 The default is 10 seconds Retries The amount of times the device resends an inform request The field range is 1 255 The default is 3 Remove Deletes the currently selected recipient The possible field values are Checked Removes the selected recipient from the list of recipients e Unchecked Maintains the list of recipients Web Click SNMP Trap Management Trap Station Management Define the fields and click Add t Trap Station Mana
368. ies for example IP phones Powered Devices are connected to the device via Ethernet ports Defining PoE System Information The PoE Properties Page contains system PoE information for enabling PoE on the device monitoring the current power usage and enabling PoE traps Command Attributes e Power Status Indicates the inline power source status e On Indicates that the power supply unit is functioning e Off Indicates that the power supply unit is not functioning e Faulty Indicates that the power supply unit is functioning but an error has occurred For example a power overload or a short circuit e Nominal Power Indicates the actual amount of power the device can supply The field value is displayed in Watts e Consumed Power Indicates the amount of the power used by the device The field value is displayed in Watts e System Usage Threshold Indicates the percentage of power consumed before an alarm is generated The field value is 1 99 percent The default is 95 percent Traps Indicate if PoE device traps are enabled The possible field values are Checked Enables PoE traps on the device e Unchecked Disables PoE traps on the device This is the default value Web Click Physical Ethernet Power over Ethernet Properties page Define the fields and click Apply 3 42 Managing P ower over Ethernet Devices 3 Figure 3 8 PoE Properties Page CLI The following is an example of PoE
369. ify any to indicate IP address 0 0 0 0 and mask 255 255 255 255 source wildcard Specifies wildcard bits by placing 1s in bit positions to be ignored Specify any to indicate IP address 0 0 0 0 and mask 255 255 255 255 destination Specifies the IP address or host name to which the packet is being sent Specify any to indicate IP address 0 0 0 0 and mask 255 255 255 255 destination wildcard Specifies wildcard bits by placing 1s in bit positions to be ignored Specify any to indicate IP address 0 0 0 0 and mask 255 255 255 255 protocol Specifies the abbreviated name or number of an IP protocol The following table lists protocols that can be specified IP Protocol Abbreviated Name Protocol Number Internet Control Message P rotocol icmp 1 Internet Group Management Protocol igmp 2 IP in IP encapsulation Protocol ipinip 4 Transmission Control Protocol tcp 6 Exterior Gateway Protocol egp 8 4 269 4 Command Line Interface IP Protocol Abbreviated Name Protocol Number Interior Gateway Protocol igp 9 User Datagram P rotocol udp 17 Host Monitoring P rotocol hmp 20 Reliable Data Protocol rdp 27 Inter Domain Policy Routing Protocol idpr 35 Ipv6 protocol ipv6 41 Routing Header for IP v6 ipv6 route 43 Fragment Header for IP v6 ipv6 frag 44 Inter Domain R outing Protocol idrp 45 Reservation Protocol rsvp 46
370. ighboring devices on all interfaces or on a specified interface Spanning tree mst Configures the device priority for the specified spanning tree GC 4 483 priority instance To return to the default configuration use the no form of this command spanning tree mst Configures the number of hops in an MST region before the BDPU GC 4 484 max hops is discarded and the port information is aged out To return to the default configuration use the no form of this command spanning tree mst Configures port priority for the specified MST instance To return IC 4 485 port priority to the default configuration use the no form of this command spanning tree mst Configures the path cost for multiple spanning tree MST IC 4 486 cost calculations If a loop occurs the spanning tree considers path cost when selecting an interface to putin the forwarding state To return to the default configuration use the no form of this command Spanning tree mst Enables configuring an MST region by entering the Multiple GC 4 487 configuration Spanning Tree MST mode instance mst Maps VLANs to an MST instance MST 4 488 name mst Defines the configuration name To return to the default setting MST 4 489 use the no form of this command revision mst Defines the configuration revision number To return to the default MST 4 490 configuration use the no form of this command show mst Displays the current or pending MST region configuration MST 4 491 exit
371. iguration Console show snmp 4 464 Community String Community Access IP address System Contact System Location The community string community access and IP address can be configured through the local terminal during the initial configuration procedure The SNMP configuration options for the Community String are as follows e Access rights options ro read only rw read and write or su Super e An option to configure IP address or not If an IP address is not configured it means that all community members having the same community name are granted the same access rights Common practice is to use two community strings for the switch one public community with read only access and the other private community with read write access The public string allows authorized management stations to retrieve MIB objects while the private string allows authorized management stations to retrieve and modify MIB objects During initial configuration it is recommended to configure the device according to the network administrator requirements in accordance with using an SNMP based management station To configure SNMP station IP address and community string s perform the following 1 Atthe console prompt enter the command Enable The prompt is displayed as 2 Enter the command configure and press lt Enter gt 3 In the configuration mode enter the SNMP configuration command with the parameters including
372. iguring ARP 3 Host Name Displays the system name e Remove Removes DHCP interfaces The possible field values are e Checked Removes the selected DHCP interface e Unchecked Maintains the DHCP interfaces e Web Click System IP Addressing DHCP define the fields and and specify a Primaryinterface click Apply Figure 3 12 DHCP Page CLI The following is an example of the DHCP CLI commands Console config interface ethernet 1 e16 4 323 Console config if ip address dhcp 4 360 Configuring ARP The Address Resolution Protocol ARP converts IP addresses into physical addresses and maps the IP address to a MAC address ARP allows a host to communicate with other hosts only when the IP address of its neighbors is known The ARP Page contains parameters for defining ARP Command Attributes ARP Entry Age Out Specifies the amount of time in seconds that passes between ARP Table entry requests Following the ARP Entry Age period the entry is deleted from the table The range is 1 40000000 The default value is 60000 seconds 3 49 3 Configuring the Switch Clear ARP Table Entries Specifies the types of ARP entries that are cleared The possible values are None Does not clear ARP entries e All Clears all ARP entries e Dynamic Clears only dynamic ARP entries e Static Clears only static ARP entries e Interface Displays the interface type fo
373. immediately after entering the show command This command is relevant only for the current session 4 562 User Interface Commands 4 Example This example dumps all output immediately after entering a show command console gt terminal data dump Related Commands The show command entered before the terminal data dump isentered show history The show history User EXEC mode command lists the commands entered in the current session Syntax show history Default Setting This command has no default configuration Command Mode User EXEC mode Command Usage The buffer includes executed and unexecuted commands Commands are listed from the first to the most recent command The buffer remains unchanged when entering into and returning from configuration modes Example The following example displays all the commands entered while in the current Privileged EXEC mode console show history SW version 3 131 date 23 Jul 2004 time 17 34 19 HW version 1 0 0 console show clock 15 29 03 Jun 17 2004 console show history show version show clock show history 3 commands were logged buffer size is 10 Related Commands history history size 4 563 4 Command Line Interface show privilege The show privilege Privileged User EXEC mode command displays the current privilege level Syntax show privilege Default Setting This command has no default configuration Command M
374. ing Domain Name System DNS Domain Name Define the fields and click Apply Default Domain Name Detant Domain Name Type Figure 3 97 Default Domain Name Page CLI The following is an example of the DNS Default Domain Name commands ip domain name 4 365 3 203 B Configuring the Switch Configuring Static DNS Host to Address Entries You can manually configure static entries in the DNS table that are used to map domain names to IP addresses Static entries may be used for local devices connected directly to the attached network or for commonly used resources located elsewhere on the network Servers or other network devices may support one or more connections via multiple IP addresses If more than one IP address is associated with a host name in the static table or via information returned from a name server a DNS client can try each address in succession until it establishes a connection with the target device The DNS Host Mapping Page contains parameters for defining static entries in the DNS table Command Attributes Host Names Displays a user defined default domain name When defined the default domain name is applied to all unqualified host names The Host Name field can contain up to 158 characters IP Address Displays the DNS host IP address Remove Removes default domain names The possible field values are Checked Removes the selected DNS host Unchecked M
375. ing FCS octets received on the interface since the device was last refreshed 3 211 B Configuring the Switch Jabbers Displays the total number of received packets that were longer than 1518 octets This number excludes frame bits but includes FCS octets that had either a bad Frame Check Sequence FCS with an integral number of octets FCS Error or a bad FCS with a non integral octet Alignment Error number The field range to detect jabbers is between 20 ms and 150 ms Collisions Displays the number of collisions received on the interface since the device was last refreshed Frames of xx Bytes Number of xx byte frames received on the interface since the device was last refreshed Web Click System RMON Statistics and select an interface j Sytem uyat i Bo Intertace cra H cus EN Retesh Rate No Retesh E Drop Events o E Received Bytes Ocom 3 Received Packets o 3 Broadcast Packets Received 0 ee Mabicast Packets Recebved CRCE Aliga Esters o Undersize Packets o E oversize Packets o Fragments o Jabbers o muon Collinisas o Frames of 64 Bytes o 0 0 Frames of 65 te 127 Bytes Frames of 128 to 255 Bytes Frames of 256 10 511 Bytes O Frames of 512 to 1023 Bytes O Frames of 1924 te 1518 Bytes O Figure 3 102 RMON Statistics Page CLI The following is an example of the CLI commands used to view RMON statistics Console gt show rmon statistics ethernet 1 el 4 437 Por
376. ing tree enabled mode MSTP Default port cost method long Spanning Tree Commands 4 Role Designated Port cost 20000 Port Fast No configured no Address 00 02 4b 29 7a 00 Designated path cost 20000 Role Alternate Port cost 20000 Port Fast No configured no Address 00 02 4b 29 1a 19 Designated path cost 20000 Role Designated Port cost 20000 Port Fast No configured no Address 00 02 4b 29 7a 00 Designated path cost 20000 4 507 4 Command Line Interface Hello Time 2 sec Hello Time 2 sec Max hops H MST 0 Vlans Mapped 1 9 21 4094 CST Root ID Priority 32768 Address 00 01 42 97 e0 00 Path 20000 Cost Root 1 1 Port el Max Age 20 Forward Delay 15 sec sec IST Master ID Priority 32768 Address 00 02 4b 19 7a 00 Path 10000 Cost Rem hops 19 Brid Priority 32768 ge ID Address 00 02 4b 29 7a 00 Max Age 20 Forward Delay 15 sec sec 20 console show spanning tree Spanning tree enabled mode MSTP Default port cost method long CST Root ID 4 508 H H H MST 0 Vlans Mapped Priority Address 1 9 21 4094 32768 00 01 42 97 e0 00 This switch is root for CST and IST master Root Port 1 1 el Hello Time 2 sec Max Age 20 sec Max hops 20 Spanning Tree Commands 4 Forward Delay 15 sec Related Commands spanning tree spanning tree mode spanning tree forward time spanning tree hello time spanning tree max a
377. ing tree max age Global Configuration mode command configures the spanning tree bridge maximum age To return to the default configuration use the no form of this command Syntax spanning tree max age seconds no spanning tree max age seconds Time in seconds Range 6 40 Default Setting The default maximum age for IEEE Spanning Tree Protocol STP is 20 seconds Command Modes Global Configuration mode Command Usage When configuring the maximum age the following relationships should be kept 2 Forward Time 1 gt Max Age Max Age gt 2 Hello Time 1 Example The following example configures the spanning tree bridge maximum age to 10 seconds Console config spanning tree max age 10 Related Commands spanning tree forward time spanning tree hello time spanning tree priority spanning tree disable spanning tree cost spanning tree port priority spanning tree portfast 4 475 4 Command Line Interface spanning tree link type show spanning tree spanning tree priority The spanning tree priority Global Configuration mode command configures the spanning tree priority of the device The priority value is used to determine which bridge is elected as the root bridge To return to the default configuration use the no form of this command Syntax spanning tree priority priority no spanning tree priority e priority Priority of the bridge Range 0 61440 in steps of 4096 Default Setting
378. interface ethernet 1 el 4 323 Console config if port monitor 1 e8 4 397 Console config if port monitor vlan tagging 4 402 Displaying Port Statistics You can display standard statistics on network traffic from the Interfaces Group and Ethernet like MIBs as well as a detailed breakdown of traffic based on the RMON MIB Interfaces and Ethernet like statistics display errors on the traffic passing through each port This information can be used to identify potential problems with the switch such as a faulty port or unusually heavy loading RMON statistics provide access to a broad range of statistics including a total count of different frame types and sizes passing through each port All values displayed have been accumulated since the last system reboot and are shown as counts per second Displaying Port Statistics Interface Statistics The Interface Statistics Page contains the following fields Interface Indicates the device for which statistics are displayed The possible field values are e Port Defines the specific port for which interface statistics are displayed 3 135 B Configuring the Switch e LAG Defines the specific LAG for which interface statistics are displayed Refresh Rate Defines the amount of time that passes before the interface statistics are refreshed The possible field values are e 15 Sec lndicates that the Interface statistics are refreshed every 15 seconds 30 Sec lInd
379. ion Console config ip http authentication radius local Related Commands show authentication methods ip https authentication The ip https authentication Global Configuration mode command specifies authentication methods for HTTPS server users To return to the default configuration use the no form of this command Syntax ip https authentication method method2 no ip https authentication method1 method2 Specify at least one from the following table Keyword Source or destination local Uses the local username database for authentication none Uses no authentication 4 260 AAA Commands 4 radius Uses the list of all RADIUS servers for authentication tacacs Uses the list of all TACACS servers for authentication Default Setting The local user database is checked This has the same effect as the command ip https authentication ocal Command Mode Global Configuration mode Command Usage The additional methods of authentication are used only if the previous method returns an error not if it fails To ensure that the authentication succeeds even if all methods return an error specify none as the final method in the command line Example The following example configures HTTPS authentication Console config ip https authentication radius local Related Commands show authentication methods show authentication methods The show authenticatio
380. ion Ethernet mode Command Usage Auto All possibilities to connect a PC with cross or normal cables are supported and are automatically detected On It is possible to connect to a PC only with a normal cable and to connect to another device only with a cross cable No It is possible to connect to a PC only with a cross cable and to connect to another device only with a normal cable Example In the following example automatic crossover is enabled on port 1 e5 Console config interface ethernet 1 e5 Console config if mdix auto Related Commands shutdown speed duplex negotiation flowcontrol back pressure show interfaces configuration show interfaces status back pressure The back pressure Interface Configuration Ethernet port channel mode command enables back pressure on a given interface To disable back pressure use the no form of this command Syntax back pressure 4 330 Ethernet Configuration Commands 4 no back pressure Default Setting Back pressure is enabled Command Mode Interface Configuration Ethernet port channel mode Command Usage There are no user guidelines for this command Example In the following example back pressure is enabled on port 1 e5 Console config interface ethernet 1 e5 Console config if back pressure Related Commands shutdown speed duplex negotiation flowcontrol mdix show interfaces configuration show interfaces statu
381. ion over the network The switch includes an onboard agent that supports SNMP versions 1 2c and 3 This agent continuously monitors the status of the switch hardware as well as the traffic passing through its ports A network management station can access this information using software such as HP OpenView Access to the onboard agent using SNMP v1 and v2c is controlled by community strings To communicate with the switch the management station must first submit a valid community string for authentication Access to the switch using SNMPv3 provides additional security features that cover message integrity authentication and encryption as well as controlling user access to specific areas of the MIB tree The SNMPv3 security structure consists of security models with each model having it s own security levels There are three security models defined SNMPv1 SNMPv2c and SNMPv3 Users are assigned to groups that are defined by a security model and specified security levels Each group also has a defined security access to set of MIB objects for reading and writing which are known as views The switch has a default view all MIB objects and default groups defined for security models v1 and v2c The following table shows the security models and levels available and the system default settings 3 76 Configuring SNMP 3 Table 3 3 SNMPv3 Security Models and Levels Model Level G
382. ion between the supplicant and the system if the supplicant is authorized Uncontrolled Access Permits uncontrolled communication regardless of the port state The device currently supports port based authentication via RADIUS servers Advanced Port Based Authentication Advanced port based authentication enables multiple hosts to be attached to a single port Advanced port based authentication requires only one host to be authorized for all hosts to have system access If the port is unauthorized all attached hosts are denied access to the network 3 109 B Configuring the Switch Advanced port based authentication also enables user based authentication Specific VLANs in the device are always available even if specific ports attached to the VLAN are unauthorized For example Voice over IP does not require authentication while data traffic requires authentication VLANs for which authorization is not required can be defined Unauthenticated VLANs are available to users even if the ports attached to the VLAN are defined as authorized Advanced port based authentication is implemented in the following modes Single Host Mode Only the authorized host can access the port Multiple Host Mode Multiple hosts can be attached to a single port Only one host must be authorized for all hosts to access the network If the host authentication fails or an EAPOL logoff message is received all attached clients are denied access to t
383. ion is valid Range 30 3650 Default Setting The Certificate and SSL s RSA key pairs do not exist If no certificate number is specified the default certificate number is 1 If no RSA key length is specified the default length is 1024 If no URL or IP address is specified the default common name is the lowest IP address of the device at the time that the certificate is generated If the number of days is not specified the default period of time that the certification is valid is 365 days Command Mode Global Configuration mode Command Usage The command is not saved in the device configuration however the certificate and keys generated by this command are saved in the private configuration which is never displayed to the user or backed up to another device 4 598 Web Server Commands 4 Use this command to generate a self signed certificate for the device If the RSA keys do not exist parameter key generate must be used Example The following example regenerates an HTTPS certificate console config crypto certificate 1 generate key generate Related Commands crypto certificate request crypto certificate import ip https certificate show crypto certificate mycertificate crypto certificate request The crypto certificate request Privileged EXEC mode command generates and displays certificate requests for HTTPS Syntax crypto certificate number request cn common name ou organization
384. ion parameters For example in the command show interfaces status ethernet 1 e5 show interfaces and status are keywords ethernet is an argument that specifies the interface type and 1 5 specifies the unit port You can enter commands as follows To enter a simple command enter the command keyword To enter multiple commands enter each command in the required order For example to enable Privileged Exec command mode and display the startup configuration enter Console gt enable Console show startup config To enter commands that require parameters enter the required parameters after the command keyword For example to set a password for the administrator enter Console config username admin password smith Minimum Abbreviation The CLI will accept a minimum number of characters that uniquely identify a command For example the command configure can be entered as con If an entry is ambiguous the system will prompt for further input Command Completion If you terminate input with a Tab key the CLI will print the remaining characters of a partial keyword up to the point of ambiguity In the logging history example typing log followed by a tab will result in printing the command up to logging Getting Help on Commands You can display a brief description of the help system by entering the help command You can also display command syntax by using the character to list keywords or
385. ion used on the TACACS daemon To specify an empty string enter Range 0 128 characters source Specifies the source IP address to use for the communication 0 0 0 0 indicates a request to use the IP address of the outgoing IP interface priority Determines the order in which the TACACS servers are used where 0 is the highest priority Range 0 65535 Default Setting No TACACS host is specified If no port number is specified default port number 49 is used If no host specific timeout key string or source value is specified the global value is used If no TACACS server priority is specified default priority 0 is used Command Mode Global Configuration mode Command Usage Multiple tacacs server host commands can be used to specify multiple hosts Example The following example specifies a TACACS host console config tacacs server host 172 16 1 1 4 552 TACACS Commands 4 Related Commands tacacs server key tacacs server timeout tacacs server source ip show tacacs tacacs server key The tacacs server key Global Configuration mode command sets the authentication encryption key used for all TACACS communications between the device and the TACACS daemon To disable the key use the no form of this command Syntax tacacs server key key string no tacacs server key e key string Specifies the authentication and encryption key for all TACACS communications between t
386. ip http port port number no ip http port port number Port number for use by the HTTP server Range 0 65535 Default Setting The default port number is 80 Command Mode Global Configuration Command Usage Specifying 0 as the port number effectively disables HTTP access to the device Example The following example configures the http port number to 100 console config ip http port 100 Related Commands ip http server show ip http ip https server The ip https server Global Configuration mode command enables configuring the device from a secured browser To return to the default configuration use the no form of this command Syntax ip https server 4 596 Web Server Commands 4 no ip https server Default Setting HTTPS server disabled Command Mode Global Configuration mode Command Usage Use the crypto certificate generate Global Configuration mode command to generate an HTTPS certificate Example The following example enables configuring the device from a secured browser console config ip https server Related Commands ip https port ip https certificate show ip https ip https port The ip https port Global Configuration mode command specifies the TCP port used by the server to configure the device through the Web browser To return to the default configuration use the no form of this command Syntax ip https port port number no ip https port port number
387. ired VLANs using the operating system or other application software so that these VLANs can be propagated onto the network For both the edge switches attached directly to these hosts and core switches in the network enable GVRP on the links between these devices You should also determine security boundaries in the network and disable GVRP on the boundary ports to prevent advertisements from being propagated or forbid those ports from joining restricted VLANs 3 158 Configuring VLANs 3 Note If you have host devices that do not support GVRP you should configure static or untagged VLANs for the switch ports connected to these devices But you can still enable GVRP on these edge switches as well as on the core switches in the network Forwarding Tagged Untagged Frames If you want to create a small port based VLAN for devices attached directly to a single switch you can assign ports to the same untagged VLAN However to participate in a VLAN group that crosses several switches you should create a VLAN for that group and enable tagging on all ports Ports can be assigned to multiple tagged or untagged VLANs Each port on the switch is therefore capable of passing tagged or untagged frames When forwarding a frame from this switch along a path that contains any VLAN aware devices the switch should include VLAN tags When forwarding a frame from this switch along a path that does not contain any VLAN aware devices including the desti
388. irements Traffic can be prioritized based on the priority bits in the IP frame s Type of Service ToS octet or the number of the TCP UDP port When these services are enabled the priorities are mapped to a Class of Service 1 5 1 Introduction value by the switch and the traffic then sent to the corresponding output queue Multicast Filtering Specific multicast traffic can be assigned to its own VLAN to ensure that it does not interfere with normal network traffic and to guarantee real time delivery by setting the required priority level for the designated VLAN The switch uses IGMP Snooping and Query to manage multicast group registration Virtual Cable Testing VCT VCT detects and reports copper link cabling occurrences such as open cables and cable shorts MDI MDIX Support The device supports auto detection between crossed and straight through cables Standard wiring for end stations is Media Dependent Interface MDI and the standard wiring for hubs and switches is known as Media Dependent Interface with Crossover MDIX Quality of Service QoS Support Network traffic is usually unpredictable and the only basic assurance that can be offered is Best Effort traffic delivery To overcome this challenge Quality of Service QOS is applied throughout the network This ensures that network traffic is prioritized according to specified criteria and that specific traffic receives preferential treatment QoS in the netw
389. is is also referred to as IGMP Snooping Default Enabled e IGMP Snooping Status Indicates if IGMP snooping is enabled on the VLAN The possible field values are e Enable Enables IGMP Snooping on the VLAN e Disable Disables IGMP Snooping on the VLAN e Auto Learn Indicates if Auto Learn is enabled on the device If Auto Learn is enabled the devices automatically learns where other Multicast groups are located Enables or disables Auto Learn on the Ethernet device The possible field values are Enable Enables auto learn e Disable Disables auto learn e Host Timeout Indicates the amount of time host waits to receive a message before timing out The default time is 260 seconds e Multicast Router Timeout Indicates the amount of the time the Multicast router waits to receive a message before it times out The default value is 300 seconds e Leave Timeout Indicates the amount of time the host waits after requesting to leave the IGMP group and not receiving a Join message from another station before timing out If a Leave Timeout occurs the switch notifies the Multicast 3 192 Multicast Filtering 3 device to stop sending traffic The Leave Timeout value is either user defined or an immediate leave value The default timeout is 10 seconds Web Click Multicast IGMP Snooping Adjust the IGMP settings as required and then click Apply The default settings are shown below Figure 3 91 IGMP
390. is performed with either via web interface or the CLI Switching between the Stacking Master and the Secondary Master results in a limited service loss Any dynamic tables are relearned if a failure occurs The running configuration file is synchronized between Stacking Master and the Secondary Master and continues running on the Secondary Master Configuring Stacking The Stack Management Topology Page allows network managers to either reset the entire stack or a specific device Device configuration changes that are not saved before the device is reset are not saved If the Stacking Master is reset the entire stack is reset Command Attributes Unit Number on Top Indicates the first stack member s number Possible values are Master and 1 8 Unit Number on Bottom Indicates the second stack member s number Possible values are Master and 1 8 e Switch Stack Control from Unit 1 to Unit 2 Switches the stack control from the Stack Master to the Secondary Stack Master The possible field values are e Checked Enables switching the stack control to the Secondary Stack Master e Unchecked Maintains the current stacking control Web Click System System Mgmt Stack Management Topology Specify the upper and lower stacking members then click Apply 3 39 B Configuring the Switch Stack Management Topology tet Mo on Top Maser x Unit Mo on Beton Master Switch Stack Coamol foss Unit tte Unh M
391. isplay the SNMP engine ID configuration To see the SNMP engine ID configuration enter the show snmp engineid Global Configuration mode command Example The following example enables SNMPv3 on the device and sets the local engine ID of the device to the default value console config snmp server engineid local default Related Commands show snmp engineid snmp server enable traps The snmp server enable traps Global Configuration mode command enables the device to send SNMP traps To disable SNMP traps use the no form of the command Syntax snmp server enable traps no snmp server enable traps Default Setting SNMP traps are enabled Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example enables SNMP traps console config snmp server enable traps Related Commands show snmp 4 458 SNMP Commands 4 snmp server filter The snmp server filter Global Configuration mode command creates or updates a Simple Network Management Protocol SNMP server filter entry To remove the specified SNMP server filter entry use the no form of this command Syntax snmp server filter filter name oid tree included excluded no snmp server filter filter name oid tree e filter name Specifies the label for the filter record that is being updated or created The name is used to reference the record Range 1 30 characters
392. isplay order Configures the order of the units in the display To return to the GC 4 544 default configuration use the no form of this command show stack Displays information about the status of a stack UE 4 545 show users Displays information about the active users UE 4 547 show sessions Lists open Telnet sessions UE 4 547 show system Displays system information UE 4 548 show version Displays system version information UE 4 549 service Enables measuring CPU utilization To return to the default GC 4 550 cpu utilization configuration use the no form of this command show cpu utilization Displays information about CPU utilization UE 4 551 ping The ping User EXEC mode command sends ICMP echo request packets to another node on the network Syntax ping ip address hostname size packet_size count packet_count timeout time_out jjp address IP address to ping hostname Host name to ping Range 1 158 characters packet_size Number of bytes in a packet The actual packet size is eight bytes larger than the specified size specified because the device adds header information Range 56 1472 bytes e packet_count Number of packets to send If 0 is entered it pings until stopped Range 0 65535 packets time_out Timeout in milliseconds to wait for each reply Range 50 65535 milliseconds Default Setting Default packet size is 56 bytes Default number of packets to send is 4 Default timeout v
393. ist Specifies the list of VLAN IDs to be removed Separate nonconsecutive VLAN IDs with a comma and no spaces A hyphen designates a range of IDs Default Setting All VLANs are allowed Command Mode Interface Configuration Ethernet port channel mode Command Usage This command can be used to prevent GVRP from automatically making the specified VLANs active on the selected ports Example The following example forbids adding VLAN IDs 234 to 256 to Ethernet port 1 e16 console config interface ethernet 1 e16 console config if switchport forbidden vlan add 234 256 4 577 4 Command Line Interface Related Commands switchport mode switchport access vlan switchport trunk allowed vlan switchport trunk native vian switchport general allowed vian switchport general pvid switchport general ingress filtering disable switchport general acceptable frame type tagged only show interfaces switchport switchport access multicast tv vlan switchport protected The switchport protected Interface Configuration mode command overrides the FDB decision and sends all Unicast Multicast and Broadcast traffic to an uplink port To return to the default configuration use the no form of the command Syntax switchport protected ethernet port port channel number no switchport protected port Specifies the uplink Ethernet port e port channel number Specifies the port channel uplink port Default Setting Ove
394. istics 1 el 4 437 3 138 Alcatel Mapping Adjacency Protocol AMAP 3 Alcatel Mapping Adjacency Protocol AMAP The AMAP protocol enables a switch to discover the topology of other AMAP aware devices in the network The protocol allows each switch to determine if other AMAP aware switches are adjacent to it Note that two switches are adjacent if and only if the following two requirements are satisfied 1 There exists a Spanning Tree path between them 2 There exists no other AMAP aware device between the two switches on that Spanning Tree path Configuring AMAP The AMAP protocol discovers adjacent switches by sending and receiving AMAP Hello packets on active Spanning Tree ports Each port can be defined as being in one of three logical states of processing the AMAP Hellopackets discovery common or passive Use the AMAP Configuration Page to enable disable AMAP and configure timeout parameters The following parameters describe the three main AMAP port states e Use the AMAP Global Configuration screen to enable disable AMAP and configure timeout parameters The following parameters describe the three main AMAP port states Discovery The initial state where a port transmits a Hello packet to detect an adjacent switch and then waits for a response Common The port has detected an adjacent switch and periodically sends Hello packets to determine that it is still present Passive A
395. ith the user name and password guest the system enters the Normal Exec command mode or guest mode displaying the Console gt command prompt Only a limited number of the commands are available in this mode You can access all commands only from the Privileged Exec command mode or administrator mode To access Privilege Exec mode open a new console session with the user name and password admin The system will now display the Console command prompt You can also enter Privileged Exec mode from within Normal Exec mode To enter Privileged Exec mode enter the following user names and passwords Username admin Password admin login password CLI session with the OmniStack 6300 24 is opened To end the CLI session enter Exit Console Username guest Password guest login password CLI session with the OmniStack 6300 24 is opened To end the CLI session enter Exit Console enable Password privileged level password Console Configuration Commands Configuration commands are privileged level commands used to modify switch settings These commands modify the running configuration only and are not saved when the switch is rebooted To store the running configuration in non volatile storage use the copy running config startup config command 4 227 4 Command Line Interface The configuration commands are organized into different modes e Global Configuration These command
396. jacencies page provides information about the systems connected to the device including the IP and MAC addresses local host information Remote VLAN and host information and the remote IP addresses Command Attributes Local Interface Indicates the interface on the local device which connects to the remote device The local interface is assigned to the AMAP application running on the local switch Remote Host Device Indicates the adjacent switch s hostname Remote Host Base MAC Indicates the adjacent switch s MAC Address Remote Interface Indicate the remote interface port connected to the device Remote VLAN Indicate the remote Vlan connected to the adjacent switch Remote IP Address Indicate the remote switch s IP address Web Click System Network Discovery Adjacencies Select whether to enable AMAP enter the desired timeout intervals and click Apply 3 140 Defining the Forwarding Database 3 A AMAP Adjacencies Local Interface Remote Host Device Remote Host Base MAC Remote Interface Remote VLAN Remote IP Address a Apply an Figure 3 60 AMAP Adjacencies Page CLI The following is an example of the AMAP Adjacencies commands Console show amap 4 295 AMAP is currently enabled AMAP Common Phase Timeout Interval seconds 5000 AMAP Discovery Phase Timeout Interval seconds 3000 Console Defining the Forwarding Database Switches store the addresses for all known devi
397. k k k k k k k k k k k k k k k k k k k k k k k k k Running SW Ver x x x x Date 11 Jan 200x Time 15 43 13 kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkxkk HW version is Base Mac address is 00 00 b0 24 11 80 Dram size is xxM bytes Dram first block size is 47104K bytes Dram first PTR is 0x1200000 Flash size is xM Devices on SMI BUS smi dev id 16 dev type 0xd04llab dev revision 0x1 Device configuration Prestera based Back to back system Slot 1 DB DX240 24G HW Rev xx xx Tapi Version xx x x x Core Version xx x x x 01 Jan 200x 01 01 22 SINIT I InitCompleted Initialization task is completed Console gt 01 Jan 200x 01 01 23 SLINK I Up l 01 Jan 200x 01 01 23 SLINK W Down e2 01 Jan 200x 01 01 23 SLINK I Up Vlan 1 01 Jan 200x 01 01 23 SLINK W Down e4 01 Jan 200x 01 01 23 SLINK W Down e46 01 Jan 200x 01 01 23 SLINK W Down e47 01 Jan 200x 01 01 23 SLINK W Down e48 After the switch boots successfully a system prompt appears console gt and the local terminal can be used to begin configuring the switch However before configuring the switch ensure that the software version installed on the device is the latest version If it is not the latest version download and install the latest version See Software Download and Reboot Configuration Overview Before assigning a static IP address to the device obtain the following information from the network ad
398. k the box next to the view name then click Delete Object Swbaee View Type Remove inchided r Figure 3 27 SNMP Views Page CLI The following in an example of the SNMP View CLI commands Console config snmp server filter filter name system included Console config snmp server filter filter name system 7 excluded Console config snmp server filter filter name ifEntry 1 included 4 459 Defining SNMP Group Profiles The SNMP Group Profile Page provides information for creating SNMP groups and assigning SNMP access control privileges to SNMP groups Groups allow network managers to assign access rights to specific device features or feature aspects Command Attributes e Group Name Displays the user defined group to which access control rules are applied The field range is up to 30 characters 3 79 B Configuring the Switch e Security Model Defines the SNMP version attached to the group The possible field values are e SNMPv1 SNMPv1 is defined for the group e SNMPv2c SNMPv2c is defined for the group e SNMPv3 SNMPv3 is defined for the group Security Level Defines the security level attached to the group Security levels apply to SNMPv3 only The possible field values are e No Authentication Indicates that neither the Authentication nor the Privacy security levels are assigned to the group e Authentication Authenticates SNMP messages and ensures that the SNMP message
399. l allowed vlan switchport general pvid switchport general ingress filtering disable switchport general acceptable frame type tagged only switchport forbidden vlan show interfaces switchport switchport access multicast tv vlan switchport general allowed vlan The switchport general allowed vlan Interface Configuration mode command adds or removes VLANs from a general port Syntax switchport general allowed vian add vian list tagged untagged switchport general allowed vlan remove vian list e add vian list Specifies the list of VLAN IDs to be added Separate nonconsecutive VLAN IDs with a comma and no spaces A hyphen designates a range of IDs e remove vian list Specifies the list of VLAN IDs to be removed Separate nonconsecutive VLAN IDs with a comma and no spaces A hyphen designates a range of IDs tagged Indicates that the port transmits tagged packets for the VLANs untagged Indicates that the port transmits untagged packets for the VLANs 4 573 4 Command Line Interface Default Setting If the port is added to a VLAN without specifying tagged or untagged the default setting is tagged Command Mode Interface Configuration Ethernet port channel mode Command Usage This command enables changing the egress rule e g from tagged to untagged without first removing the VLAN from the list Example The following example adds VLANs 2 5 and 6 to the allowed list of Ethernet port 1 e16
400. ld is enabled only if Locked is selected in the Set Port field The possible field values are e Classic Lock Locks the port using the classic lock mechanism The port is immediately locked regardless of the number of addresses that have already been learned e Limited Dynamic Lock Locks the port by deleting the current dynamic MAC 3 106 Defining Access Profiles 3 addresses associated with the port The port learns up to the maximum addresses allowed on the port Both relearning and aging MAC addresses are enabled Max Entries Specifies the number of MAC address that can be learned on the port The Max Entries field is enabled only if Locked is selected in the Set Port field In addition the Limited Dynamic Lock mode is selected The default is 1 Action Defines the action to be applied to packets arriving on a locked port The possible field values are e Forward Forwards packets from an unknown source without learning the MAC address e Discard Discards packets from any unlearned source This is the default value e Shutdown Discards packets from any unlearned source and shuts down the port The port remains shut down until reactivated or until the device is reset Trap Enables traps when a packet is received on a locked port The possible field values are e Checked Enables traps e Unchecked Disables traps Trap Frequency Sec Defines the amount of time in seconds bet
401. le switchport general acceptable frame type tagged only switchport forbidden vlan show interfaces switchport switchport access multicast tv vlan switchport general ingress filtering disable The switchport general ingress filtering disable Interface Configuration mode command disables port ingress filtering Ingress filtering discards frames to VLAN where port does not belong To return to the default configuration use the no form of this command Syntax switchport general ingress filtering disable no switchport general ingress filtering disable Default Setting Ingress filtering is enabled Command Mode Interface Configuration Ethernet port channel mode Command Usage There are no user guidelines for this command 4 575 4 Command Line Interface Example The following example disables port ingress filtering on Ethernet port 1 e16 console config interface ethernet 1 e16 console config if switchport general ingress filtering disable Related Commands switchport mode switchport access vlan switchport trunk allowed vlan switchport trunk native vian switchport general allowed vlan switchport general pvid switchport general acceptable frame type tagged only switchport forbidden vian show interfaces switchport switchport access multicast tv vlan switchport general acceptable frame type tagged only The switchport general acceptable frame type tagged only Interface Configuration mode comman
402. le port ACLs are used for the following main purposes e As a security mechanism either permitting or denying entry to packets in a group This mechanism is described in the section on Network Security e As a mechanism to classify packets into traffic classes for which various CoS QoS handling actions are executed ACLs contain multiple classification rules and actions An Access Control Element ACE is composed of a single classification rule and its action A single ACL may contain one or more ACEs The order of the ACEs within an ACL is important as they are applied in a first fit manner The ACEs are processed sequentially starting with the first ACE When a packet is matched to an ACE classification the ACE action is performed and the ACL processing terminates If more than one ACL is to be processed the default drop action is applied only after processing all the ACLs The default drop action requires the user to explicitly allow all the traffic that is permitted including management traffic such as telnet HTTP or SNMP that is directed to the router itself Two types of ACLs are defined e IP ACL Applies only to IP packets All classification fields are related to IP packets e MAC ACL Applies to any packet including non IP packets Classification fields are based only on Layer 2 There are two ways to apply ACLs to an interface e Policy In this form ACLs are grouped together into a more complex structure
403. le shows the class map for class1 Console gt show class map classl Class Map match any class1 id4 Match Ip dscp 11 21 Related Commands class map match The match Class map Configuration mode command defines the match criteria for classifying traffic To delete the match criteria use the no form of this command Syntax match access group aci name no match access group aci name acl name Specifies the name of an IP or MAC ACL Default Setting No match criterion is supported Command Mode Class map Configuration mode Command Usage There are no user guidelines for this command Example The following example defines the match criterion for classifying traffic as an access group called Alcatel in a class map called class1 Console config class map class1l Console config cmap match access group atcatel Related Commands ip access list mac access list 4 409 4 Command Line Interface policy map The policy map Global Configuration mode command creates a policy map and enters the Policy map Configuration mode To delete a policy map use the no form of this command Syntax policy map policy map name no policy map policy map name policy map name Specifies the name of the policy map Default Setting If the packet is an IP packet the DCSP value of the policy map is 0 If the packet is tagged the CoS value is 0 Command Mode Global Configuration mode Command Usa
404. led 200 600 10000 Related Commands gvrp enable Interface garp timer gvrp vian creation forbid clear gvrp statistics show gvrp statistics The show gvrp statistics User EXEC mode command displays GVRP statistics Syntax show gvrp statistics ethernet interface port channel port channel number interface A valid Ethernet port Full syntax unit port 4 349 4 Command Line Interface port channel number A valid port channel number Default Setting This command has no default configuration Command Mode User EXEC mode Command Usage There are no user guidelines for this command Example The following example shows GVRFP statistical information Legend rJE rEmp rLE sJE sEmp SLE Port rJE Console gt show gvrp statistics GVRP Statistics Join Empty Received Empty Received Leave Empty Received Join Empty Sent Empty Sent Leave Empty Sent rJIn rEmp rLIn rLE rLA rdiIn ELIN rLA sJIn sLIn sLA sJE sJIn Join In Received Leave In Received Leave All Received Join In Sent Leave In Sent Leave All Sent sEmp sLIn SLE sLA Related Commands clear gvrp statistics show gvrp error statistics show gvrp error statistics The show gvrp error statistics User EXEC mode command displays GVRP error statistics Syntax show gvrp error statistics ethernet interface port channel port channel number interface A valid Ethernet
405. level encrypted ho username name name The name of the user Range 1 20 characters password The authentication password for the user Range 1 159 characters e level The user level Range 1 15 encrypted Encrypted password entered copied from another device configuration Default Setting No user is defined Command Mode Global Configuration mode Command Usage User account can be created without a password Example The following example configures user bob with password lee and user level 15 to the system Console config username bob password lee level 15 Related Commands show privilege 4 264 ACL Commands 4 ACL Commands Table 4 7 ACL Commands Command Function Mode Page ip access list Enables the IP Access Configuration mode and creates Layer 3 GC 4 255 ACLs To delete an ACL use the no form of this command permit IP Permits traffic if the conditions defined in the permit statement ACL 4 266 match deny IP Denies traffic if the conditions defined in the deny statement ACL 4 269 match mac access list Enables the MAC Access List Configuration mode and creates GC 4 271 Layer 2 ACLs To delete an ACL use the no form of this command permit MAC Defines permit conditions of an MAC ACL ACL 4 272 deny MAC Denies traffic if the conditions defined in the deny statement ACL 4 273 match service acl Applies an ACL to
406. llowing command enables multiple hosts clients on an 802 1X authorized port Console config if dotlx multiple hosts Related Commands dot1x single host violation show dot1x advanced dot1x single host violation The dot1x single host violation Interface Configuration mode command configures the action to be taken when a station whose MAC address is not the supplicant MAC address attempts to access the interface Use the no form of this command to return to default Syntax dot1x single host violation forward discard discard shutdown trap seconds no port dot1x single host violation forward Forwards frames with source addresses that are not the supplicant address but does not learn the source addresses e discard Discards frames with source addresses that are not the supplicant address e discard shutdown Discards frames with source addresses that are not the supplicant address The port is also shut down trap Indicates that SNMP traps are sent e seconds Specifies the minimum amount of time in seconds between consecutive traps Range 1 1000000 Default Setting Frames with source addresses that are not the supplicant address are discarded No traps are sent Command Mode Interface Configuration Ethernet mode Command Usage The command is relevant when multiple hosts is disabled and the user has been successfully authenticated 4 251 4 Command Line Interface Example The following
407. lowing is an example of the RADIUS CLI Commands Console config radius server console config radius server console config radius server Console config radius server Console config radius server Console config radius server host 192 168 10 1 auth port 20 timeout 20 key alcatel server retransmit 5 source ip 10 1 1 1 timeout 5 deadtime 10 4 430 4 431 4 432 4 433 4 433 4 434 Defining TACACS Methods Terminal Access Controller Access Control System TACACS provides centralized security user access validation Up to 4 TACACS servers are supported TACACS provides a centralized user management system while still retaining consistency with RADIUS and other authentication processes TACACS provides the following services 3 103 B Configuring the Switch e Authentication Provides authentication during login and via user names and user defined passwords e Authorization Performed at login Once the authentication session is completed an authorization session starts using the authenticated user name The TACACS protocol ensures network integrity through encrypted protocol exchanges between the client and TACACS server The TACACS default parameters are user assigned defaults The default settings are applied to newly defined TACACS servers If default values are not defined the system defaults are applied to the new TACACS new servers The TACACS Page contains
408. lt Setting This command has no default configuration Command Modes Privileged EXEC mode Command Usage This feature should be used only when working in RSTP or MSTP mode Example The following example restarts the protocol migration process on Ethernet port 1 eli console clear spanning tree detected protocols ethernet 1 e11 Related Commands show spanning tree spanning tree mst priority The spanning tree mst priority Global Configuration mode command configures the device priority for the specified spanning tree instance To return to the default configuration use the no form of this command Syntax spanning tree mst instance id priority priority no spanning tree mst instance id priority instance id ID of the spanning tree instance Range 1 16 priority Device priority for the specified spanning tree instance Range 0 61440 in multiples of 4096 Default Setting The default bridge priority for IEEE Spanning Tree Protocol STP is 32768 Command Mode Global Configuration mode 4 483 4 Command Line Interface Command Usage The device with the lowest priority is selected as the root of the spanning tree Example The following example configures the spanning tree priority of instance 1 to 4096 console config spanning tree mst 1 priority 4096 Related Commands spanning tree mst max hops spanning tree mst port priority spanning tree mst cost spanning tree mst config
409. m of this command to delete a MAC address show bridge Displays all entries in the bridge forwarding database PE 4 287 address table show bridge Displays statically created entries in the bridge forwarding PE 4 288 address table static database show bridge Displays the number of addresses present in the Forwarding PE 4 289 address table count Database show bridge Displays multicast MAC address or IP address table information PE 4 290 multicast address table show bridge Displays the multicast filtering configuration UE 4 292 multicast filtering show ports security Displays the port lock status PE 4 293 show ports security Displays the current dynamic addresses in locked ports PE 4 294 addresses bridge address The bridge address Interface Configuration VLAN mode command adds a MAC layer station source address to the bridge table To delete the MAC address use the no form of this command Syntax bridge address mac address ethernet interface port channel port channel number permanent delete on reset delete on timeout secure no bridge address mac address mac address A valid MAC address e interface A valid Ethernet port port channel number A valid port channel number permanent The address can only be deleted by the no bridge address command delete on reset The address is deleted after reset e delete on timeout The address is deleted after age out time has expired
410. mark down Range 0 63 Default Setting The default map is the Null map which means that each incoming DSCP value is mapped to the same DSCP value Command Mode Global Configuration mode Command Usage DSCP values 3 11 19 cannot be remapped to other values The mapping of the IP DSCP to priority queue is set on a per system basis If this mode is active a non IP packet is always classified to the best effort queue 4 424 QoS Commands 4 Example The following example fails to mark down incoming DSCP value 3 as DSCP value 43 on the policed DSCP map Console config qos map policed dscp 3 to 43 Reserved DSCP DSCP 3 was not configured Related Commands show qos interface qos map dscp queue qos map dscp queue The qos map dscp queue Global Configuration mode command modifies the DSCP to CoS map To return to the default map use the no form of this command Syntax qos map dscp queue dscp list to queue id no qos map dscp queue e dscp list Specifies up to 8 DSCP values separated by a space Range 0 63 queue id Specifies the queue number to which the DSCP values are mapped Default Setting The following table describes the default map DSCP Value Queue Number 0 15 q1 Lowest Priority 16 31 q2 32 47 q3 48 63 q4 Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example maps DSCP values 33
411. mber of EAPOL Logoff frames that have been received by this Authenticator EapolR espldF ramesR x The number of EAP Resp ld frames that have been received by this Authenticator EapolRespF ramesR x The number of valid EAP Response frames other than Resp ld frames that have been received by this Authenticator EapolR eqldF ramesT x The number of EAP Reqj Id frames that have been transmitted by this Authenticator EapolR eqF ramesTx The number of EAP Request frames other than R g ld frames thathave been transmitted by this Authenticator InvalidE apolF ramesRx The number of EAPOL frames that have been received by this Authenticator in which the frame type is not recognized EapLengthE rrorF ramesRx The number of EAPOL frames that have been received by this Authenticator in which the Packet Body Length field is invalid LastE apolF rameVersion The protocol version number carried in the most recently received EAPOL frame LastE apolFrameS ource The source MAC address carried in the most recently received EAPOL frame Related Commands show dot1x show dot1x users show dot1x advanced ADVANCED FEATURES dot1x auth not req The dot1x auth not req Interface Configuration mode command enables unauthorized devices access to the VLAN To disable access to the VLAN use the no form of this command 4 249 4 Command Line Interface Syntax dot1x auth not req no dot1x auth not req Default Configuration Access is ena
412. me HH MM SS 08 19 17 MAC Address 00 08 78 32 98 78 Authentication Method Remote Termination Cause Supplicant logoff Authenticator State Machine State HELD Backend State Machine State IDLE Authentication success 9 Authentication fails 1 4 243 Username Viewing EAP Statistics The 802 1X Statistic Page contains information about EAP packets received on a specific port Command Attributes e Port lIndicates the port which is polled for statistics e Refresh Rate Indicates the amount of time that passes before the EAP statistics are refreshed The possible field values are e 15 Sec Indicates that the EAP statistics are refreshed every 15 seconds 3 117 B Configuring the Switch 30 Sec Indicates that the EAP statistics are refreshed every 30 seconds 60 Sec Indicates that the EAP statistics are refreshed every 60 seconds e No Refresh Indicates that the EAP statistics are not refreshed e Frames Receive Indicates the number of valid EAPOL frames received on the port Frames Transmit Indicates the number of EAPOL frames transmitted via the port Start Frames Receive Indicates the number of EAPOL Start frames received on the port e Log off Frames Receive Indicates the number of EAPOL Logoff frames that have been received on the port e Respond ID Frames Receive Indicates the number of EAP Resp Id frames that have been received on the port Res
413. member field null Null destination for copies or files A remote file can be copied to null to determine its size backup config Represents the backup configuration file This is a user defined name for up to five backup configuration files unit member backup config Backup configuration on one of the units Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage Up to five backup configuration files are supported on the device The location of a file system dictates the format of the source or destination URL The entire copying process may take several minutes and differs from protocol to protocol and from network to network prv and sys files cannot be copied Understanding Invalid Combinations of Source and Destination Some invalid combinations of source and destination exist Specifically you cannot copy if one of the following conditions exist The source file and destination file are the same file xmodem is the destination file xmodem as source file can be copied to image boot and null only tftp is the source file and destination file on the same copy 4 316 Configuration and Image File Commands 4 The following table describes copy characters Character Description For network transfers indicates that the copy process is taking place Each exclamation point indicates successful transfer of te
414. ment Undersize Pkts The total number of packets received less than 64 octets long excluding framing bits but including FCS octets and otherwise well formed Oversize Pkts The total number of packets received longer than 1518 octets excluding framing bits but including FCS octets and otherwise well formed Fragments The total number of packets received less than 64 octets in length excluding framing bits but including FCS octets and either a bad Frame Check Sequence FCS with an integral number of octets FCS Error ora bad FCS witha non integral number of octets Alignment E rror J abbers The total number of packets received longer than 1518 octets excluding framing bits butincluding FCS octets and either a bad Frame Check Sequence FCS with an integral number of octets FCS Error ora bad FCS with a non integral number of octets Alignment Error 64 Octets The total number of packets including bad packets received that are 64 octets in length excluding framing bits but including FCS octets 65 to 127 Octets The total number of packets including bad packets received that are between 65 and 127 octets in length inclusive excluding framing bits but including FCS octets 128 to 255 Octets The total number of packets including bad packets received that are between 128 and 255 octets in length inclusive excluding framing bits but including FCS octets 256 to 5
415. ministrator A specific IP address allocated by the network administrator for the switch to be configured 2 16 Initial Configuration 2 e Network mask for the network There are two types of configuration Initial configuration consists of configuration functions with basic security considerations whereas advanced configuration includes dynamic IP configuration and more advanced security considerations After making any configuration changes the new configuration must be saved before rebooting To save the configuration enter the following CLI command Console copy running config startup config 4 315 Initial Configuration Initial configuration which starts after the device has booted successfully includes static IP address and subnet mask configuration and setting user name and privilege level to allow remote management If the device is to be managed from an SNMP based management station SNMP community strings must also be configured The following configurations are completed e Static IP Address and Subnet Mask e Static Route Configuration e User Name e SNMP Community strings Static IP Address and Subnet Mask IP interfaces can be configured on each interface of the device After entering the configuration command it is recommended to check if a interface was configured with the IP address by entering the show ip interface command The commands to configure the device are interface specific To mana
416. mmand Mode Interface Configuration Ethernet Command Usage There are no user guidelines for this command Example The following example enables periodic re authentication of the client Console config interface ethernet 1 e16 Console config if dotlx re authentication Related Commands dot1x port control dot1x timeout re authperiod dot1x timeout quiet period dot1x timeout tx period dot1x max req dot1x timeout supp timeout dot1x timeout server timeout show dot1x show dot1x users dot1x timeout re authperiod The dot1x timeout re authperiod Interface Configuration mode command sets the number of seconds between re authentication attempts To return to the default configuration use the no form of this command Syntax dot1x timeout re authperiod seconds no dot1x timeout re authperiod 4 236 802 1x Commands 4 seconds Number of seconds between re authentication attempts Range 300 4294967295 Default Setting Re authentication period is 3600 seconds Command Mode Interface Configuration Ethernet mode Command Usage There are no user guidelines for this command Example The following example sets the number of seconds between re authentication attempts to 300 Console config interface ethernet 1 e16 Console config if dotlx timeout re authperiod 300 Related Commands dot1x port control dot1x re authentication dot1x timeout quiet period dot1x timeout tx period do
417. mmand Usage There are no user guidelines for this command Example The following example disables Ethernet port 1 e5 operations Console config interface ethernet 1 e5 Console config if shutdown The following example restarts the disabled Ethernet port Console config interface ethernet 1 e5 Console config if no shutdown Related Commands speed duplex negotiation flowcontrol mdix back pressure show interfaces configuration show interfaces status description The description Interface Configuration Ethernet port channel mode command adds a description to an interface To remove the description use the no form of this command Syntax description string no description string Comment or a description of the port to enable the user to remember what is attached to the port Range 1 64 characters Default Setting The interface does not have a description 4 325 4 Command Line Interface Command Mode Interface Configuration Ethernet port channel mode Command Usage There are no user guidelines for this command Example The following example adds a description to Ethernet port 1 e5 Console config interface ethernet 1 e5 Console config if description RD sw 3 Related Commands show interfaces description speed The speed Interface Configuration Ethernet port channel mode command configures the speed of a given Ethernet interface when not using auto neg
418. mple sets a subnet based classification rule console console console console console console config vlan database config vlan map subnet 192 1 1 1 27 subnets group 7 config vlan exit config interface ethernet 1 e18 config if switchport mode general config if switchport general map subnets group 7 vlan 2 Related Commands map subnet subnets group show vlan subnets group map mac macs group The map mac macs group VLAN Configuration mode command maps a MAC address or a range of MAC addresses to a group of MAC addresses Use the no form of this command to delete a map Syntax map mac mac address prefix mask host macs group group 4 589 4 Command Line Interface no map mac mac adoress prefix mask host mac address Specifies the MAC address to be entered to the group e prefix mask Specifies the Mask bits The format is the MAC address format host Specifies all 1 s mask group Specifies the group number Range 1 2147483647 Default Configuration This command has no default configuration Command Mode VLAN Configuration mode Command Usage There are no user guidelines for this command Example The following example maps a MAC address or a range of MAC addresses to a group of MAC addresses console config vlan database console config vlan map mac 00 08 78 32 98 78 9 macs group 1 interface ethernet e17 Related Commands show vlan m
419. multicast address A valid IP multicast address e interface list Separate nonconsecutive Ethernet ports with a comma and no spaces a hyphen is used to designate a range of ports port channel number list Separate nonconsecutive port channels with a comma and no spaces a hyphen is used to designate a range of ports Default Setting No multicast addresses are defined Command Mode Interface configuration VLAN mode 4 279 4 Command Line Interface Command Usage If the command is executed without add or remove the command only registers the group in the bridge database Static multicast addresses can only be defined on static VLANs Examples The following example registers the MAC address Console config interface vlan 8 Console config if bridge multicast address 01 00 5e 02 02 03 The following example registers the MAC address and adds ports statically Console config interface vlan 8 Console config if bridge multicast address 01 00 5e 02 02 03 add ethernet 1 el e9 2 e2 Related Commands bridge multicast filtering bridge multicast forbidden address bridge multicast forward all bridge multicast forbidden forward all bridge multicast forbidden address The bridge multicast forbidden address Interface Configuration VLAN mode command forbids adding a specific multicast address to specific ports Use the no form of this command to return to the default configuration Syntax
420. n Command Mode VLAN Configuration mode Command Usage The following protocol names ar reserved for Ethernet Encapsulation 4 592 VLAN Commands 4 e ip arp e ipv6 e ipx Example The following example maps protocol ethernet to protocol group 2000 console config vlan database console config vlan map protocol ethernet protocols group 2000 Related Commands ip igmp snooping multicast tv show vlan protocols group switchport general map protocols group vlan The switchport general map protocols group vlan interface Configuration mode command sets a protocol based classification rule To delete a classification use the no form of the command Syntax switchport general map protocols group group vlan vlan id no switchport general map protocols group group group Specifies the group number as defined in the map protocol to protocols group Range 1 65535 vian id Defines the VLAN ID in the classifying rule Range Valid VLAN Default Setting This command has no default configuration Command Mode Interface Configuration Ethernet port channel Command Usage There are no user guidelines for this command Example The following example sets a protocol based classification rule console config if switchport general map protocols group vlan 8 Related Commands vian name show vlan 4 593 4 Command Line Interface show vlan protocols group The show vlan protocols
421. n Default Setting Disabled Command Mode Global Configuration mode Command Usage Use the show cpu utilization Privileged EXEC command to view information on CPU utilization Example This example enables measuring CPU utilization console config service cpu utilization Related Commands show cpu utilization 4 550 TACACS Commands 4 show cpu utilization The show cpu utilization Privileged EXEC mode command displays information about CPU utilization Syntax show cpu utilization Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage Use the service cpu utilization Global Configuration mode command to enable measuring CPU utilization Example console show cpu utilization CPU utilization service is on CPU utilization five seconds 5 one minute 3 five minutes 3 TACACS Commands Table 4 31 TACACS Commands Command Function Mode Page tacacs server host Specifies a TACACS host To delete the specified name or GC 4 552 address use the no form of this command tacacs server key Sets the authentication encryption key used for all TACACS GC 4 553 communications between the device and the TACACS daemon To disable the key use the no form of this command tacacs server Sets the interval during which the device waits fora TACACS GC 4 553 imeout server to reply To return to the default confi
422. n IGMP report for a multicast ICV 4 353 host time out group was not received for a host time out period from a specific port this port is deleted from the member list of that multicast group To return to the default configuration use the no form of this command 4 351 4 Command Line Interface Table 4 14 IGMP Snooping Commands Command Function Mode Page ip igmp snooping Configures the mrouter time out command is used for setting the ICV 4 354 mrouter time out aging out time after multicast device ports are automatically earned To return to the default configuration use the no form of this command ip igmp snooping Configures the leave time out If an IGMP report for a multicast ICV 4 355 leave time out group was not received for a leave time out period after an IGMP Leave was received from a specific port this port is deleted from he member list of that multicast group To return to the default configuration use the no form of this command show ip igmp Displays information on dynamically learned multicast device UE 4 356 snooping mrouter interfaces show ip igmp Command displays IGMP snooping configuration UE 4 357 snooping interface show ip igmp Displays multicast groups learned by IGMP snooping UE 4 357 snooping groups ip igmp snooping Global The ip igmp snooping Global Configuration mode command enables Internet Group Management Protocol IGMP snooping To
423. n be applied to management access methods For example console users can be authenticated by Authentication Profile List 1 while Telnet users are authenticated by Authentication Method List 2 Authentication methods are selected using arrows The order in which the methods are selected is the order by which the authentication methods are used The Authentication Mapping Page contains parameters for mapping authentication methods Command Attributes Console Authentication profiles used to authenticate console users Telnet Authentication profiles used to authenticate Telnet users Secure Telnet SSH Authentication profiles used to authenticate Secure Shell SSH users SSH provides clients secure and encrypted remote connections to a device Secure HTTP Authentication methods used for Secure HTTP access Possible field values are e None No authentication method is used for access e Local Authentication occurs locally e RADIUS Authentication occurs at the RADIUS server e Line Authentication using a line password e Enable Authentication using enable Local RADIUS Authentication first occurs locally If authentication cannot be verified locally the RADIUS server authenticates the management method If the RADIUS server cannot authenticate the management method the session is blocked e RADIUS Local Authentication first occurs at the RADIUS server If authentication cannot be verifi
424. n methods Privileged EXEC mode command displays information about the authentication methods Syntax show authentication methods Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays the authentication configuration Console show authentication methods Login Authentication Method Lists 4 261 4 Command Line Interface Default Radius Local Line Console Login Line None Enable Authentication Method Lists Default Radius Enable Console Enable Enable None Line Login Method List Enable Method List Console Console Login Console Enable Telnet Default Default SSH Default Default http Radius Local https Radius Local dotix Radius Related Commands aaa authentication login aaa authentication enable login authentication enable authentication ip http authentication ip https authentication password The password Line Configuration mode command specifies a password on a line To remove the password use the no form of this command Syntax password password encrypted no password password Password for this level Range 1 159 characters encrypted Encrypted password to be entered copied from another 4 262 AAA Commands 4 device configuration Default Setting No password is defined Command Mode Line Configuratio
425. n mode Command Usage If a password is defined as encrypted the required password length is 32 characters Example The following example specifies password secret on a console Console config line console Console config line password secret Related Commands user id enable password The enable password Global Configuration mode command sets a local password to control access to user and privilege levels To remove the password requirement use the no form of this command Syntax enable password level evel password encrypted no enable password level evel e password Password for this level Range 1 159 characters e level Level for which the password applies If not specified the level is 15 Range 1 15 encrypted Encrypted password entered copied from another device configuration Default Setting No enable password is defined Command Mode Global Configuration mode Command Usage There are no user guidelines for this command 4 263 4 Command Line Interface Example The following example sets local level 15 password secret to control access to user and privilege levels Console config enable password level 15 secret Related Commands show privilege username The username Global Configuration mode command creates a user account in the local database To remove a user name use the no form of this command Syntax username name password password level
426. n packets 512 bytes each For network transfers indicates that the copy process timed out Generally many periods in a row means that the copy process may fail Copying an Image File from a Server to Flash Memory To copy an image file from a server to flash memory use the copy source url image command Copying a Boot File from a Server to Flash Memory To copy a boot file from a server to flash memory enter the copy source url boot command Copying a Configuration File from a Server to the Running Configuration File To load a configuration file from a network server to the running configuration file of the device enter the copy source url running config command The commands in the loaded configuration file are added to those in the running configuration file as if the commands were typed in the command line interface CLI Thus the resulting configuration file is a combination of the previous running configuration and the loaded configuration files with the loaded configuration file taking precedence Copying a Configuration File from a Server to the Startup Configuration To copy a configuration file from a network server to the startup configuration file of the device enter copy source url startup config The startup configuration file is replaced by the copied configuration file Storing the Running or Startup Configuration on a Server Use the copy running config destination url command to copy the curren
427. n ssh key string The key string SSH Public Key string Configuration mode command manually specifies an SSH public key Syntax key string key string row key string row Indicates the SSH public key row by row e key string Specifies the key in UU encoded DER format UU encoded DER format is the same format in the authorized_keys file used by OpenSSH Default Setting No keys exist Command Mode SSH Public Key string Configuration mode 4 516 SSH Commands 4 Command Usage Use the key string SSH Public Key string Configuration mode command to specify which SSH public key is to be interactively configured next To complete the command you must enter a row with no characters Use the key string row SSH Public Key string Configuration mode command to specify the SSH public key row by row Each row must begin with a key string row command This command is useful for configuration files Example The following example enters public key strings for SSH public key client bob console config crypto key pubkey chain ssh console config pubkey chain user key bob rsa console config pubkey key key string AAAAB3NzaClyc2 EAAAADAQABAAABAOCVTnRwPW1 Al4kpqIw9GBRonZQZxj HKcqKL6rM1Q ZNXf ZSkvHG Qus1IZ 76ILmFT34v7u7CHFAE Vu4GREpSwoQUvV35LqJdJk6710U zfwOllg kTwm175QR9gHuj S6KwGN2QWXgh3ub8gDj TSq muSn Wd05iDX2IExQWu08licgl1k02LYciz ZA4TYEU 9FIxwPiVQOjc KBXuROjuNg5nFYsY OZCkON W9a tnkm1shRE7Di71 w3fNiOA 6w9044t6 AINEICBCC
428. n the device The possible field values are e Enable Enables STP on the device e Disable Disables STP on the device e STP Operation Mode Specifies the STP mode that is enabled on the device The possible field values are Classic STP Enables Classic STP on the device This is the default value e Rapid STP Enables Rapid STP on the device e Multiple STP Enables Multiple STP on the device e BPDU Handling Determines how BPDU packets are managed when STP is disabled on the port or device BPDUs are used to transmit spanning tree information The possible field values are e Filtering Filters BPDU packets when spanning tree is disabled on an interface This is the default value e Flooding Floods BPDU packets when spanning tree is disabled on an interface e Path Cost Default Values Specifies the method used to assign default path cost to STP ports The possible field values are e Short Specifies 1 through 65 535 range for port path cost This is the default value e Long Specifies 1 through 200 000 000 range for port path cost The default path cost assigned to an interface varies according to the selected method Hello Time Max Age or Forward Delay Priority 0 65535 Specifies the bridge priority value When switches or bridges are running STP each is assigned a priority After exchanging BPDUs the device 3 146 Defining Spanning Tree 3 with the lowest priority value
429. n their CoS tag value e DSCP Sets the Trust mode to CoS Packets are requeued based on their DSCP tag value Always Rewrite DSCP Rewrites the packet DSCP tag according to the QoS DSCP Rewriting configuration Always Rewrite DSCP can only be checked if the Trust mode is set to DSCP Copy from Entry Number Copies the port Trust settings from the selected port To Entry Number Indicates the port to which the port Trust settings is copied e Interface Indicates the interface for which the QoS basic mode parameters are displayed The possible field values are e Port Indicates the port for which the QoS basic mode parameters are displayed e LAG Indicates the LAG for which the QoS basic mode parameters are displayed e Disable Trust Mode Disables the Trust mode on the selected interfaces Web Click Policy Basic Mode General define the fields and click Apply 3 183 B Configuring the Switch WebView pin General Trst Mede Fors M Aways Rewnte OSEP Copy hom Entry Wembe to Entry Number s a interfaca Disable Trent Mode gg i 2 j2 L2 33 is aa 5 5 r 66 Co 77 c aes 9 9 Le 10 0 i nu 6G 212 ie nu Ls uM i 6 Ls 16 16 Cc vv 6 16 18 Cc 9 19 r ail Figure 3 84 Basic Mode General Page CLI The following is an example of the CLI commands used to configure QoS Basic Mode s general parameters Console config qos trust dscp 4 426 Defining
430. naeeeseeeeesnaeeseneeeneneeees 3 109 E EE cadteeduls puuksnansaacadyatunseteycaeyeenntcalusnedsusaeegccensgaesasgetcnsvaeesatergaccnde 3 119 Defining Access Control Lists cceecceeceeeeeeeeeeeeeeeeeeseeeeeseeeeeeeeaeeseaeeeaeenaaee 3 120 Configuring Interface Connections ce eeeeeeeeseeeeeeeeeeeeneeteeeeeaeeteeeeeaeeteeeeeatens 3 126 Creating Trunks nison aeee deka A A EAN ER 3 128 Alcatel Mapping Adjacency Protocol AMAP scceseseeeeneeeeeneeteeneeereees 3 139 Defining the Forwarding Database eeeeseeeeneeeeeneeeseneeeeesneeeeseeeneneeees 3 141 Contents Configuring Spanning Tree ecccesceescesseeeeseeceeeteneeseeeeeseeeaceeeaeesseeseaeeeneetaaes 3 145 Defining Spanning Tree ceeeeeceeceeeeeeeeeeeneeeeeeeeaeeeeeseaeeeeeseaeeeeeteaeeseeeeentes 3 146 Contiguring VLANS sosisini Ree 3 157 Configuring Quality Of Service ooo eee eecceeeeeeeeeeeeeeeeseeeeeeeteaeeeaeesseteteeteneenaes 3 174 Multicast Filtering ci ceccccccicciviectesccaet ccevcceeetdsetnaseh eeneioe eiir Eai 3 192 Configuring Domain Name Service cc cccccecccesseceeeeeeeseneeeeseeeeeseeeessneees 3 200 Defining Default DOMAINS ssssssneesessnrneessrrnnrrestrrnssrnnrtnesrennnneernnnssrennnnnene 3 203 Managing RMON Statistics cccssceceececeseneeeeeneeeseeeeeseeeeeseneessneeeeseneeeeees 3 211 Chapter 4 Command Line Interface 4 223 Using the Command Line Interface oo eceeceeeeeeeeeeeeeeeeeseeeeeeeeseaeeneeeeeaees
431. nagers You must specify trap managers so that key events are reported by this switch to your management station using network management platforms such as HP OpenView You can specify up to five management stations that will receive authentication failure messages and other trap messages from the switch Command Attributes e Recipients IP Displays the IP address to which the traps are sent e Notification Type Displays the notification sent The possible field values are e Trap Indicates traps are sent e Inform Indicates informs are sent e Community String Displays the community string of the trap manager e Notification Version Displays the trap type The possible field values are e SNMP V1 Indicates that SNMP Version 1 traps are sent e SNMP V2c Indicates that SNMP Version 2 traps are sent UDP Port Displays the UDP port used to send notifications The default is 162 Filter Name Indicates if the SNMP filter for which the SNMP Notification filter is defined e Timeout Indicates the amount of time in seconds the device waits before re sending informs The default is 15 seconds e Retries Indicates the amount of times the device re sends an inform request The default is 3 seconds e Remove Deletes the currently selected recipient The possible field values are Checked Removes the selected recipient from the list of recipients e Unchecked Maintains the list of recip
432. nation host the switch must first strip off the VLAN tag before forwarding the frame When the switch receives a tagged frame it will pass this frame onto the VLAN s indicated by the frame tag However when this switch receives an untagged frame from a VLAN unaware device it first decides where to forward the frame and then inserts a VLAN tag reflecting the ingress port s default VID Displaying Basic VLAN Information The VLAN Basic Information page displays basic information on the VLAN type supported by the switch Command Attributes e VLAN ID Displays the VLAN ID Name Displays the user defined VLAN name e Type Displays the VLAN type The possible field values are e Dynamic The VLAN was dynamically created through GARP e Static The VLAN is user defined e Default The VLAN is the default VLAN Authentication Indicates whether unauthorized users can access a Guest VLAN The possible field values are e Enable Enables unauthorized users to use the Guest VLAN Disable Disables unauthorized users from using the Guest VLAN e Remove Removes VLANs The possible field values are Checked Removes the selected VLAN e Unchecked Maintains VLANs 3 159 B Configuring the Switch Web Click VLAN VLAN Basic Information Basic Information VLAN Typo Authentication Modity Remove Name A detsk detest Enabled 4 C 2 VLAN Shc Enabled r Figure 3 69 VLAN Basic Info
433. nd Mode User EXEC mode 4 402 Power over Ethernet Commands 4 Command Usage There are no user guidelines for this command Example The following example displays information about inline power Console gt show power inline Power On Nominal Power 150 Watt Consumed Power 120 Watts 80 Usage Threshold 95 Traps Enabled Port Powered Device State Priority Status Classification w 1 e1 IP Phone Model Auto High On 0 44 12 95 A 2 el Wireless AP Auto Low On 0 44 3 84 Model 3 el Auto Low Off N A Console gt show power inline ethernet 1 e1 Port Powered Device State Priority Status Classification w 1 e1 IP Phone Model Auto High On 0 44 12 95 A Overload Counter 1 Short Counter 0 Denied Counter 0 Absent Counter 0 Invalid Signature Counter 0 4 403 4 Command Line Interface The following table describes the significant fields shown in the example Field Description Power The operational status of the inline power sourcing equipment Nominal Power The nominal power of the inline power sourcing equipment in Watts Consumed Power Measured usage power in Watts Usage Threshold The usage threshold expressed in percents for comparing the measured power and initiating an alarm if threshold is exceeded Traps Indicates if inline power traps are enabled Port The Ethernet port number Powered Device Description of the powered device type S
434. nd at the system prompt as shown in the configuration example Console gt enable 4 558 Console configure 4 559 Console config username admin password lee privilege 15 4 264 SNMP Community Strings Simple Network Management Protocol SNMP provides a method for managing network devices Devices supporting SNMP run a local software agent The SNMP agents maintain a list of variables used to manage the device The variables are defined in the Management Information Base MIB The MIB presents the variables controlled by the agent The SNMP agent defines the MIB specification format as well as the format used to access the information over the network Access rights to the SNMP agents are controlled by access strings and SNMP community strings The device is SNMP compliant and contains an SNMP agent that supports a set of standard and private MIB variables Developers of management stations require the exact structure of the MIB tree and receive the complete private MIBs information before being able to manage the MIBs All parameters are manageable from any SNMP management platform except the SNMP management station IP address and community community name and access rights The SNMP management access to the switch is disabled if no community strings exist Note The device switch is delivered with no community strings configured 2 18 Initial Configuration 2 The following screen displays the default device conf
435. ndard Secure Shell SSH A secure replacement for remote access functions including Telnet SSH can authenticate users with a cryptographic key and encrypt data connections between management clients and the switch Simple Mail Transfer Protocol SMTP A standard host to host mail transport protocol that operates over TCP port 25 Simple Network Management Protocol SNMP The application protocol in the Internet suite of protocols which offers network management services Simple Network Time Protocol SNTP SNTP allows a device to set its internal clock based on periodic updates from a Network Time Protocol NTP server Updates can be requested from a specific NTP server or can be received via broadcasts sent by NTP servers Spanning Tree Protocol STP A technology that checks your network for any loops A loop can often occur in complicated or backup linked network systems Spanning Tree detects and directs data along the shortest available path maximizing the performance and efficiency of the network Telnet Defines a remote communication facility for interfacing to a terminal device over TCP IP Terminal Access Controller Access Control System Plus TACACS TACACS is a logon authentication protocol that uses software running on a central server to control access to TACACS compliant devices on the network Transmission Control Protocol Internet Protocol TCP IP Protocol suite that includes TCP as the primary
436. nds Console config spanning tree forward time 25 Related Commands spanning tree hello time 4 473 4 Command Line Interface spanning tree max age spanning tree priority spanning tree disable spanning tree cost spanning tree port priority spanning tree portfast spanning tree link type show spanning tree spanning tree hello time The spanning tree hello time Global Configuration mode command configures the spanning tree bridge hello time which is how often the device broadcasts hello messages to other devices To return to the default configuration use the no form of this command Syntax spanning tree hello time seconds no spanning tree hello time e seconds Time in seconds Range 1 10 Default Setting The default hello time for IEEE Spanning Tree Protocol STP is 2 seconds Command Modes Global Configuration mode Command Usage When configuring the hello time the following relationship should be kept Max Age gt 2 Hello Time 1 Example The following example configures spanning tree bridge hello time to 5 seconds Console config spanning tree hello time 5 Related Commands spanning tree forward time spanning tree max age spanning tree priority spanning tree disable spanning tree cost 4 474 Spanning Tree Commands 4 spanning tree port priority spanning tree portfast spanning tree link type show spanning tree spanning tree max age The spann
437. nds seconds Common transmission timeout value in seconds Range 1 65535 seconds Default Setting 300 seconds Command Mode Global Configuration Mode Command Usage If there is no reply packet from an adjacent switch after two timeout intervals the switch entry for the port will be removed and port will revert to the Discovery state Example 4 297 4 Command Line Interface The following example sets the time that ports in the Common state wait before sending a Hello packet to an adjacent switch to 5000 seconds Console config amap common timer 5000 Console config show amap The show amap priviledged EXEC mode command displays the current AMAP settings on the switch Syntax show amap Default Setting None Command Mode Priviledged EXEC Mode Command Usage There are no user guidelines for this command Example The following example displays the current AMAP settings on the switch Console show amap AMAP is currently enabled AMAP Common Phase Timeout Interval seconds 5000 AMAP Discovery Phase Timeout Interval seconds 3000 Console Clock Commands Table 4 10 Clock Commands Command Function Mode Page clock set Manually sets the system clock PE 4 299 clock source Configures an external time source for the system clock Use no GC 4 300 form of this command to disable external time source clock timezone Configures an external time s
438. ned or the name of the policy map to be created added to or modified must first be specified Class policies can be configured in a policy map only if the classes have defined match criteria An aggregate policer can be applied to multiple classes in the same policy map but an aggregate policer cannot be used across different policy maps Define an aggregate policer if the policer is shared with multiple classes Policers in one port cannot be shared with other policers in another device Traffic from two different ports can be aggregated for policing purposes Command Attributes e Policy Name Displays a policy name 3 187 B Configuring the Switch Remove Removes policies The possible field values are Checked Removes the selected policy e Unchecked Maintains policiers Class Map Selects a class map for the class Police Policer type for the class Possible values are e Aggregate Configures the class to use a configured aggregate policer selected from the drop down menu An aggregate policer is defined if the policer is shared with multiple classes Traffic from two different ports can be configured for policing purposes An aggregate policer can be applied to multiple classes in the same policy map but cannot be used across different policy maps e Single Configures the class to use manually configured information rates and exceed actions Aggregate Policer User defined aggregate policers I
439. new dscp queue queue id cos new cos no set new dscp Specifies a new DSCP value for the classified traffic Range 0 63 queue id Specifies an explicit queue ID for setting the egress queue new cos Specifies a new user priority for marking the packet Range 0 7 Default Setting This command has no default configuration Command Mode Policy map Class Configuration mode Command Usage This command is mutually exclusive with the trust Policy map Class Configuration command within the same policy map Policy maps that contain set or trust Policy map Class Configuration commands or that have ACL classifications cannot be attached to an egress interface by using the service policy Ethernet Port channel Interface Configuration mode command To return to the Policy map Configuration mode use the exit command To return to privileged EXEC mode use the end command 4 413 4 Command Line Interface Example The following example sets the DSCP value in the packet to 56 for classes in in policy map called policy class map class1 Console config policy map policyl Console config pmap class class1l Console config pmap c set dscp 56 Related Commands trust cos dscp police The police Policy map Class Configuration mode command defines the policer for classified traffic To remove a policer use the no form of this command Syntax police committed rate bps committed burst byte exceed acti
440. nfiguration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example shows the status of the SNTP Console show sntp status Clock is synchronized stratum 4 reference is 176 1 1 8 unicast Reference time is AFE2525E 70597B34 00 10 22 438 PDT Jul 5 1993 Unicast servers Server Status Last response Offset Delay mSec msec 176 1 51 8 Up 19 58 22 289 PDT Feb 19 2002 Lass 117 79 766285 7 Unknown 12 17 17 987 PDT Feb 19 2002 8 98 189 19 9 Anycast server Server Interfa Sta Last response Offset Delay ce tus mSec mSec 176 1 11 8 VLAN Up 9 53 21 789 PDT Feb 19 7 19 119 89 118 2002 Broadcast 4 314 Configuration and Image File Commands 4 Interface Interfa Last response ce L76 9 1 1 VLAN 19 17 59 792 PDT Feb 19 2002 TTS Configuration and Image File Commands Table 4 11 Configuration and Image File Commands Command Function Mode Page copy Copies files from a source to a destination PE 4 315 delete Deletes a file from a flash memory of device PE 4 318 boot system Specifies the system image that the device loads at startup PE 4 319 show Displays the contents of the currently running configuration file PE 4 319 running config show startup config Displays the contents of the startup configuration file PE 4 320 show bootvar Displays the active system image file that is loaded by
441. nfiguration mode command limits messages logged to the console based on severity To disable logging to the console use the no form of this command Syntax logging console eve no logging console e level Specifies the severity level of logged messages displayed on the console Possible values emergencies alerts critical errors warnings notifications informational debugging Default Setting The default severity level is informational Command Mode Global Configuration mode Command Usage There are no user guidelines for this command 4 523 4 Command Line Interface Example The following example limits logging messages displayed on the console to severity level errors console config logging console errors Related Commands logging show logging logging buffered The logging buffered Global Configuration mode command limits syslog messages displayed from an internal buffer based on severity To cancel using the buffer use the no form of this command Syntax logging buffered eve no logging buffered e level Specifies the severity level of messages logged in the buffer Possible values emergencies alerts critical errors warnings notifications informational debugging Default Setting The default severity level is informational Command Mode Global Configuration mode Command Usage All the syslog messages are logged to the internal buffer This command limits the mes
442. nfiguration mode command sets the interval during which the device waits for a server host to reply To return to the default configuration use the no form of this command Syntax radius server timeout timeout 4 433 4 Command Line Interface no radius server timeout e timeout Specifies the timeout value in seconds Range 1 30 Default Setting The timeout value is 3 seconds Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example configures the timeout interval to 5 seconds console config radius server timeout 5 Related Commands radius server host radius server key radius server retransmit radius server source ip radius server deadtime show radius servers radius server deadtime The radius server deadtime Global Configuration mode command improves RADIUS response time when servers are unavailable The command is used to cause the unavailable servers to be skipped To return to the default configuration use the no form of this command Syntax radius server deadtime deadtime no radius server deadtime deadtime Length of time in minutes during which a RADIUS server is skipped over by transaction requests Range 0 2000 Default Setting The deadtime setting is 0 Command Mode Global Configuration mode Command Usage There are no user guidelines for this command 4 434 Radius Commands 4 Example
443. nfigured no Address N A Designated path cost N A Role Alternate Port cost 20000 Port Fast No configured no Designated path cost 20000 Role N A Port cost 20000 Port Fast N A configured no Designated path cost N A 4 501 4 Command Line Interface Number of transitions to forwarding state N A BPDU sent N A received N A console show spanning tree ethernet 1 e1l Port 1 1 el enabled State Forwarding Role Root Port id 128 1 Port cost 20000 Type P2p configured auto RSTP Port Fast No configured no Designated bridge Priority 32768 Address 00 01 42 97 e0 00 Designated port id 128 25 Designated path cost 0 Number of transitions to forwarding state 1 BPDU sent 2 received 120638 console show spanning tree mst configuration Name Regionl Revision 1 Instance Vlans mapped State 0 1 9 21 4094 Ena ble 1 10 20 Ena ble console show spanning tree Spanning tree enabled mode MSTP Default port cost method long H MST 0 Vlans Mapped 1 9 21 4094 CST Root ID Priority 32768 4 502 Spanning Tree Commands 4 Address 00 01 42 97 e0 00 Path 20000 Cost Root 1 1 Port el Hello Time 2 sec Max Age 20 Forward Delay 15 sec sec IST Master ID Priority 32768 Address 00 02 4b 29 7a 00 This switch is the IST master Hello Time 2 sec Max Age 20 Forward Delay 15 sec sec Max hops 20 Interfaces Name State Prio Nbr Cost Sts
444. ng example enables AMAP on the switch Console config amap enable Console config amap run The amap run global configuration mode enables AMAP on the switch Use the no form to disable AMAP on the switch Syntax amap run no amap run Default Setting Enabled Command Mode Global Configuration Mode Command Usage There are no user guidelines for this command Example The following example enables AMAP on the switch Console config amap run Console config 4 296 AMAP Configuration 4 amap discovery timer The amap discovery timer global configuration mode command configures the discovery transmission timeout value Syntax amap discovery timer seconds e seconds Discovery transmission timeout value in seconds The time that ports in the Discovery state wait for a response to a Hello packet from an adjacent switch Range 1 65535 seconds Default Setting 30 seconds Command Mode Global Configuration Mode Command Usage There are no user guidelines for this command Example The following example configures the discovery transmission timeout value as 300 seconds Console config amap discovery timer 3000 Console config amap common timer The amap common timer global configuration mode command sets the time in seconds that switch ports in the Common state wait before sending a Hello packet to an adjacent switch Syntax amap common timer seco
445. ng the Switch Viewing the RMON Events Logs The RMON Events Logs Page contains a list of RMON events To view RMON event logs Command Attributes e Event Displays the RMON Events Log entry number Log No Displays the log number Log Time Displays the time when the log entry was entered Description Displays the log entry description Web Click System RMON Events Events Logs and select an interface Events Logs Event Log Ne Log Time Description Figure 3 106 RMON Events Logs Page CLI The following is an example of the CLI commands used to view RMON events Logs Console gt show rmon events 4 448 Index Description Type Community Owner Last time sent 1 Errors Log CLI Jan 18 2002 23 58 17 2 High Log device Manag Jan 18 2002 23 59 48 Broadcast Trap er 3 220 Managing RMON Statistics 3 Defining RMON Alarms The RMON Alarm Page contains fields for setting network alarms Network alarms occur when a network problem or event is detected Rising and falling thresholds generate events To set RMON alarms Command Attributes Alarm Entry Indicates a specific alarm e Counter Name Displays the selected MIB variable e Interface Displays interface for which RMON statistics are displayed The possible field values are e Port Displays the RMON statistics for the selected port e LAG Displays the RMON statistics for the selected LAG e Counter Value Dis
446. ng time show bridge address table static The show bridge address table static Privileged EXEC mode command displays statically created entries in the bridge forwarding database Syntax show bridge address table static vlan vian ethernet interface port channel port channel number e vian Specifies a valid VLAN such as VLAN 1 e interface A valid Ethernet port 4 288 Address Table Commands 4 e port channel number A valid port channel number Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays all static entries in the bridge forwarding database Console show bridge address table static Aging time is 300 sec vlan mac address port type T 00 60 70 4C 73 FF 1 e8 Permanent 1 00 60 70 8C 73 FF 1 e8 delete on timeout 200 00 10 0D 48 37 FF 1 e9 delete on reset Related Commands bridge address show bridge address table count The show bridge address table count Privileged EXEC mode command displays the number of addresses present in the Forwarding Database Syntax show bridge address table count vlan vian ethernet interface number port channel port channel number vian Specifies a valid VLAN such as VLAN 1 interface A valid Ethernet port port channel number A valid port channel number Default Setting This command has no de
447. ng to the DSCP queue map The following table describes the VPT Default Mapping Table VPT Value Queue Number 0 2 1 1 2 1 3 2 4 426 QoS Commands 4 4 3 5 3 6 4 7 4 Example The following example configures the system to the DSCP trust state Console config qos trust dscp Related Commands qos cos The qos cos Interface Configuration Ethernet port channel mode command defines the default CoS value of a port To return to the default configuration use the no form of this command Syntax qos cos default cos e default cos Specifies the default CoS value of the port Range 0 7 Default Setting Default CoS value of a port is 0 Command Mode Interface Configuration Ethernet port channel mode Command Usage If the port is trusted the default CoS value of the port is used to assign a CoS value to all untagged packets entering the port Example The following example configures port 1 e15 default CoS value to 3 Console config interface ethernet 1 e15 Console config if qos cos 3 Related Commands trust cos dscp qos trust Global 4 427 4 Command Line Interface qos dscp mutation The qos dscp mutation Global Configuration mode command applies the DSCP Mutation map to a system DSCP trusted port To return to the trust state with no DSCP mutation use the no form of this command Syntax qos dscp mutation no q
448. ngress Committed Information Rate CIR CIR in bits per second This field is only relevant when the Police value is Single Ingress Committed Burst Size CBS CBS in bytes per second This field is only relevant when the Police value is Single Exceed Action Action assigned to incoming packets exceeding the CIR This field is only relevant when the Police value is Single Possible values are e Drop Drops packets exceeding the defined CIR value e Remark DSCP Remarks packets DSCP values exceeding the defined CIR value e None Forwards packets exceeding the defined CIR value Web Click Policy Advanced Mode Aggregate Policier define the fields and click Apply 3 188 Configuring Quality of Service 3 Aggregate Policer ee oe Ce cae Exceed Action Modily Remove 1 r c Figure 3 88 Aggregate Policer Page CLI The following is an example of the CLI commands used aggregate policies Console config policy map policyl 4 410 Console config pmap class class1l Console config pmap c police 124000 9600 exceed action drop 4 414 Defining Tail Drop The Tail Drop Page permits network managers to set the device to drop packets which exceed the threshold size Tail Drop is configured per queue Command Attributes Queue No Indicates the traffic queue for which the tail drop settings are defined Threshold 0 100 Defines the bandwidth amount after which packets
449. nits are reloaded Command Modes Privileged EXEC mode Command Usage If no unit is specified all units are reloaded Example The following example reloads Unit 2 of the stack console config stack reload unit 2 Related Commands stack master stack display order show stack stack display order The stack display order Global Configuration mode command configures the order of the units in the display To return to the default configuration use the no form of this command Syntax stack display order top unit bottom unit no stack display order top unit Specifies the number of the unit displayed at the top Range 4 544 System Management Commands 4 1 8 bottom unit Specifies the number of the unit displayed at the bottom Range 1 8 Default Setting The master unit is displayed at the top Command Modes Global Configuration mode Command Usage If the units are not adjacent in ring or chain topology the units are not at the edge and the default display order is used Example This example displays unit 6 at the top of the display and unit 1 at the bottom console config console config stack display order top 6 bottom 1 Related Commands stack master stack reload show stack show stack The show stack User EXEC mode command displays information about the status of a stack Syntax show stack unit unif e unit Specifies the number of the unit Range 1
450. nk Stat Down Down Down Down Up Down Down Down Down Down Down Down Down Down Down Down Down Down Down Back Pressure Disabled Mdix Mode Ethernet Configuration Commands 4 show interfaces description The show interfaces description Privileged EXEC mode command displays the description for all configured interfaces Syntax show interfaces description ethernet interface port channel port channel number e interface Valid Ethernet port Full syntax unit port e port channel number A valid port channel number Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays descriptions of configured interfaces Console show interfaces description Port Description ch1 ch2 Related Commands description show interfaces counters The show interfaces counters User EXEC mode command displays traffic seen by the physical interface 4 337 4 Command Line Interface Syntax show interfaces counters ethernet interface port channel port channel number interface A valid Ethernet port Full syntax unit port e port channel number A valid port channel number Default Setting This command has no default configuration Command Mode User EXEC mode Command Usage There are no user guidelines for this command
451. nks which automatically take over when a primary link goes down The spanning tree algorithms supported by this switch include these versions STP Spanning Tree Protocol IEEE 802 1D e RSTP Rapid Spanning Tree Protocol IEEE 802 1w e MSTP Multiple Spanning Tree Protocol IEEE 802 1s STA uses a distributed algorithm to select a bridging device STA compliant switch bridge or router that serves as the root of the spanning tree network It selects a root port on each bridging device except for the root device which incurs the lowest path cost when forwarding a packet from that device to the root device Then it selects a designated bridging device from each LAN which incurs the lowest path cost when forwarding a packet from that LAN to the root device All ports connected to designated bridging devices are assigned as designated ports After determining the lowest cost spanning tree it enables all root ports and designated ports and disables all other ports Network packets are therefore only forwarded between root ports and designated ports eliminating any possible network loops Once a stable network topology has been established all bridges listen for Hello BPDUs Bridge Protocol Data Units transmitted from the Root Bridge If a bridge does not get a Hello BPDU after a predefined interval Maximum Age the bridge assumes that the link to the Root Bridge is down This bridge will then initiate negotiations with other bri
452. nly to those VLANs for which static VLAN registration exists Example The following example disables dynamic VLAN creation on Ethernet port 1 e6 Console config interface ethernet 1 e6 Console config if gvrp vlan creation forbid Related Commands gvrp enable Interface garp timer gvrp registration forbid show gvrp configuration gvrp registration forbid The gvrp registration forbid Interface Configuration Ethernet port channel mode command deregisters all dynamic VLANs on a port and prevents VLAN creation or registration on the port To allow dynamic registration of VLANs on a port use the no form of this command Syntax gvrp registration forbid no gvrp registration forbid Default Setting Dynamic registration of VLANs on the port is allowed Command Mode Interface Configuration Ethernet port channel mode Command Usage There are no user guidelines for this command 4 347 4 Command Line Interface Example The following example forbids dynamic registration of VLANs on Ethernet port 1 e6 Console config interface ethernet 1 e6 Console config if gvrp registration forbid Related Commands gvrp enable Interface garp timer gvrp vian creation forbid show gvrp configuration clear gvrp statistics The clear gvrp statistics Privileged EXEC mode command clears all GVRP statistical information Syntax clear gvrp statistics ethernet interface port channel port channel n
453. no form of this command Syntax spanning tree port priority priority 4 478 Spanning Tree Commands 4 no spanning tree port priority e priority The priority of the port Range 0 240 in multiples of 16 Default Setting The default port priority for IEEE Spanning Tree Protocol STP is 128 Command Modes Interface Configuration Ethernet port channel mode Command Usage There are no user guidelines for this command Example The following example configures the spanning priority on Ethernet port 1 e15 to 96 console config interface ethernet 1 e15 console config if spanning tree port priority 96 Related Commands spanning tree forward time spanning tree hello time spanning tree max age spanning tree priority spanning tree disable spanning tree cost spanning tree portfast spanning tree link type show spanning tree spanning tree portfast The spanning tree portfast Interface Configuration mode command enables PortFast mode In PortFast mode the interface is immediately put into the forwarding state upon linkup without waiting for the standard forward time delay To disable PortFast mode use the no form of this command Syntax spanning tree portfast auto no spanning tree portfast e auto Specifies that the software waits for 3 seconds with no BPDUs received on the interface before putting the interface into PortFast mode Default Setting PortFast mode is disabled 4 479 4 Command Line
454. not be already configured as a source port e The port cannot be a member in a port channel An IP interface is not configured on the port e GVRP is not enabled on the port e The port is not a member of a VLAN except for the default VLAN will automatically be removed from the default VLAN e The following restrictions apply to ports configured to be source ports The port cannot be already configured as a destination port Example The following example copies traffic on port 1 e8 source port to port 1 e1 destination port Console config interface ethernet 1 el Console config if port monitor 1 e8 Related Commands port monitor vian tagging show ports monitor 4 397 4 Command Line Interface show ports monitor The show ports monitor User EXEC mode command displays the port monitoring status Syntax show ports monitor Default Setting This command has no default configuration Command Mode User EXEC mode Command Usage There are no user guidelines for this command Example The following example shows how the port monitoring status is displayed Console gt show ports monitor Source Port Destination Port Type Status VLAN Tagging 1 el 1 e8 RX TX Active No 1 e2 1 e8 RX TX Active No 1 e18 1 e8 RX Active No Related Commands port monitor port monitor vlan tagging Power over Ethernet Commands Table 4 22 Power Over Ethernet Commands Command Function Mode Pa
455. nsis osre iaaiiai 4 389 Port Channel Commands c ccccescecseseeeeeeeeeseeeeeceneeeseneeeeseeessneeessesessaes 4 393 Port Monitor Commands saisir a a E EREE EE 4 396 Power over Ethernet Commands ccecccecececeeeneeeeeeeeeseneeeeseeeesseseeeeseeeeees 4 398 QOS COMMANAS ccrann a TE 4 405 Radius Commands ccccsececeeneeeeenceeeeeeeeeceaeeeeeaececeaeesscaeeeeseaeesseeeeessneeeeees 4 429 RMON Command s cceeesceeeenceeeseneeeeseeeeceneeeecaeeeeseneeeseaeeesssaeesesneeesseeess 4 436 SNMP Commands cccccessceeessceeeeneeeeeeneeeseneeeceneeeseaeeeeseneeeeneeeeseneeeessnsessnaees 4 451 Spanning Tree Commands eceeeeeeeceeeeeeeeeeeeeeeeeeeeeeeeaeeseaeeeeeeseaeeeeeeneeeaas 4 470 SSH Command S isse errorea e aeaa aa eaa aaae EEE a eare Ee iaa EErEE 4 510 Syslog Commands 000 ceeceeeeececeeeneeeeeeeeeeeeeeeaeeeeaeesseeseaeeeaeeseaeseeesseeenieeeneeetaes 4 521 System Management Commands ceceeeeeeeeseeeeeeeeeeeeeeeeeeeeeeeeteaeeeeeeeneeeeas 4 533 TACACS Commands cccecceeeseceeeseneeeeneeeeseaeeeesaeeeescneeeseneeeseneeessneeseeees 4 551 User Interface Command aidi scicciesscccecices cechisenscendeccevsceecsavlsaesceestescueuesieaesc 4 556 VLAN Commands ccccccceeecceesseeeeeseeeesneeeccaeeeseneeesceeesssaeessnseeeseeeesenseeseaes 4 564 Web Server Command srice rnirar a N a a Ee iaia 4 594 Software Features c ccccceccccssccesescceesseeeeeseeeeeeaeeessaeeeeseneeesea
456. nsole config if negotiation Related Commands shutdown speed duplex flowcontrol mdix back pressure show interfaces advertise show interfaces configuration 4 328 Ethernet Configuration Commands 4 show interfaces status flowcontrol The flowcontrol Interface Configuration Ethernet port channel mode command configures flow control on a given interface To disable flow control use the no form of this command Syntax flowcontrol auto on off no flowcontrol auto Indicates auto negotiation on Enables flow control off Disables flow control Default Setting Flow control is off Command Mode Interface Configuration Ethernet port channel mode Command Usage Negotiation should be enabled for flow control auto Example In the following example flow control is enabled on port 1 e5 Console config interface ethernet 1 e5 Console config if flowcontrol on Related Commands shutdown speed duplex negotiation mdix back pressure show interfaces configuration show interfaces status mdix The mdix Interface Configuration Ethernet mode command enables cable crossover on a given interface To disable cable crossover use the no form of this command 4 329 4 Command Line Interface Syntax mdix on auto no mdix e on Manual mdix auto Automatic mdi mdix Default Setting The default is on Command Mode Interface Configurat
457. nsole config vlan vlan 1972 Related Commands vian database name show vlan interface vlan The interface vlan Global Configuration mode command enters the Interface Configuration VLAN mode Syntax interface vlan vian id e vian id Specifies an existing VLAN ID Default Setting This command has no default configuration 4 567 4 Command Line Interface Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example configures VLAN 1 with IP address 131 108 1 27 and subnet mask 255 255 255 0 console config interface vlan 1 console config if ip address 131 108 1 27 255 255 255 0 Related Commands vlan database show vlan interface range vian The interface range vian Global Configuration mode command enables simultaneously configuring multiple of VLANs Syntax interface range vlan vian range all vian range Specifies a list of VLAN IDs to be added Separate nonconsecutive VLAN IDs with a comma and no spaces a hyphen designates a range of IDs e all All existing static VLANs Default Setting This command has no default configuration Command Mode Global Configuration mode Command Usage Commands under the interface range context are executed independently on each interface in the range If the command returns an error on one of the interfaces an error message is displayed and execution of
458. nsole show interfaces port channel Channel Ports Hl Active 1 el 2 e2 2 Active 2 e2 2 e7 Inactive 3 el 3 Active 3 e3 3 e8 Related Commands channel group Port Monitor Commands Table 4 21 Port Monitor Commands Command Function Mode Page port monitor Starts a port monitoring session To stop a port monitoring ICE 4 397 session use the no form of this command port monitor Transmits tagged ingress mirrored packets To transmit untagged ICE 4 396 vlan tagging ingress mirrored packets use the no form of this command show ports monitor Displays the port monitoring status UE 4 398 4 396 Port Monitor Commands 4 port monitor The port monitor Interface Configuration mode command starts a port monitoring session To stop a port monitoring session use the no form of this command Syntax port monitor src interface rx tx no port monitor src interface e src interface Valid Ethernet port Full syntax unit port e rx Monitors received packets only e tx Monitors transmitted packets only Default Setting Monitors both received and transmitted packets Command Mode Interface Configuration Ethernet mode Command Usage This command enables traffic on one port to be copied to another port or between the source port src interface and a destination port port being configured The following restrictions apply to ports configured as destination ports The port can
459. nstance id port priority priority no spanning tree mst instance id port priority e instance ID ID of the spanning tree instance Range 1 16 e priority The port priority Range 0 240 in multiples of 16 Default Setting The default port priority for IEEE Multiple Spanning Tree Protocol MSTP is 128 Command Modes Interface Configuration Ethernet port channel mode Command Usage There are no user guidelines for this command 4 485 4 Command Line Interface Example The following example configures the port priority of port 1 g1 to 142 console config interface ethernet 1 g1 console config if spanning tree mst 1 port priority 142 Related Commands spanning tree mst priority spanning tree mst max hops spanning tree mst cost spanning tree mst configuration instance mst name mst revision mst show mst exit mst abort mst show spanning tree spanning tree mst cost The spanning tree mst cost Interface Configuration mode command configures the path cost for multiple spanning tree MST calculations If a loop occurs the spanning tree considers path cost when selecting an interface to put in the forwarding state To return to the default configuration use the no form of this command Syntax spanning tree mst instance id cost cost no spanning tree mst instance id cost instance ID ID of the spanning tree instance Range 1 16 cost The port path cost Range 1 200 00
460. nterface Remove Unbinds the selected ACL from the interface The possible field values are Checked Unbinds the ACL and interface Unchecked Maintains the ACL and interface binding Web Click Security Access Control IP Based ACL and click Apply se ACL Binding Tratte Central Unit No 1 A tno 1 o gt 2 Copy from Entry Number to Row Neeriber s Access Coriri Interface ACL Name Edit Remove 1 2 E 2 e Apoy Layer 2 Figure 3 49 ACL Binding Page CLI The following is an example of the IP Based ACL CLI commands Console config ip access list ip acll 4 265 Console config ip al 3 122 Defining Access Control Lists 3 Defining IP Based Access Control Lists The P Based ACL Page contains information for defining IP Based ACLs including defining the ACEs defined for IP Based ACLs Command Attributes e ACL Name Displays the user defined IP based ACLs e Remove Removes the IP based ACLs The possible field values are Checked Removes the selected IP based ACL e Unchecked Maintains the IP based ACLs ACE Priority Indicates the ACE priority that determines which ACE is matched to a packet based on a first match basis The possible field value is 1 2147483647 e Protocol Creates an ACE based on a specific protocol e Select from List Selects from a protocols list on which ACE can be based The possible field values are Any Matches th
461. o Time hold 1 topology change 35 notification 2 Ss hello 2 max age 20 forward delay 15 Port 1 1 e1 enabled State Forwarding Role Root Port id 128 1 Port cost 20000 Type P2p configured auto RSTP Port Fast No configured no Address 00 01 42 97 e0 00 Designated path cost 0 Number of transitions to forwarding state 1 Port 2 1 e2 enabled State Forwarding Port id 128 2 Type Shared configured auto STP Designated bridge Priority 32768 Designated port id 128 2 Number of transitions to forwarding state 1 BPDU sent 2 received 170638 Port 3 1 e3 disabled State N A Port id 128 3 Type N A configured auto Designated bridge Priority N A Designated port id N A Number of transitions to forwarding state N A BPDU sent N A received N A Port 4 1 e4 enabled State Blocking Port id 128 4 Type Shared configured auto STP Designated bridge Priority 28672 Designated port id 128 25 Number of transitions to forwarding state 1 BPDU sent 2 received 120638 Port 5 1 e5 enabled State Disabled Port id 128 5 Type N A configured auto Designated bridge Priority N A Designated port id N A Address 00 30 94 41 62 c8 Address N A Spanning Tree Commands 4 Role Designated Port cost 20000 Port Fast No configured no Address 00 02 4b 29 7a 00 Designated path cost 20000 Role N A Port cost 20000 Port Fast N A co
462. occurs for example two device ports are not functioning while the rest of the device ports remain functional Error Indicates that a device error has occurred for example if a single port is Offline Warning Indicates the lowest level of a device warning The device is functioning but an operational problem has occurred Notice Provides device information for example a port is not operating Informational Provides device information Debug Provides debugging messages Console Defines the minimum severity level from which logs are sent to the console RAM Logs Defines the minimum severity level from which logs are sent to the Event Log kept in RAM Cache Log File Defines the minimum severity level from which logs are sent to the Message Log kept in FLASH memory Web Click System Mgmt Logs Log Settings and enable logs i anano gas Figure 3 17 Log Settings Page CLI The following is an example of the CLI commands used to view system logs 3 58 Copying Files 3 console config logging on 4 528 console config logging console errors 4 525 console config logging buffered debugging 4 526 console config logging file alert 4 528 cosole nconfig end 4 563 console clear logging file 4 529 Logging File y nly Viewing Memory Logs The system allows you to enable or disable event logging and specify which levels are logged to RAM or flash memory
463. ock source 4 308 Clock Commands 4 sntp broadcast client enable sntp anycast client enable sntp unicast client enable sntp unicast client poll show sntp configuration show sntp status sntp unicast client enable The sntp unicast client enable Global Configuration mode command enables the device to use the Simple Network Time Protocol SNTP to request and accept SNTP traffic from servers To disable requesting and accepting SNTP traffic from servers use the no form of this command Syntax sntp unicast client enable no sntp unicast client enable Default Setting The SNTP unicast client is disabled Command Mode Global Configuration mode Command Usage Use the sntp server Global Configuration mode command to define SNTP servers Example The following example enables the device to use the Simple Network Time Protocol SNTP to request and accept SNTP traffic from servers Console config sntp unicast client enable Related Commands sntp authentication key sntp authenticate sntp trusted key sntp client poll timer sntp broadcast client enable sntp anycast client enable sntp unicast client poll 4 309 4 Command Line Interface sntp unicast client poll The sntp unicast client poll Global Configuration mode command enables polling for the Simple Network Time Protocol SNTP predefined unicast servers To disable the polling for SNTP client use the no form of this command Syntax sntp unicast
464. od to the authentication profile e Local Authenticates the user at the device level The device checks the user name and password for authentication 3 98 Defining Access Profiles 3 e RADIUS Authenticates the user at the RADIUS server e Line Authenticates the user using a line password Enable Authenticates the user using an enable password Remove Removes the selected authentication profile The possible field values are Checked Removes the selected authentication profile e Unchecked Maintains the authentication profiles Web Click System WebViewMgmt Authentication Authentication Profiles define the fields and click Apply Authentication Profiles Login Authentication Prolite Name Metheds Modity Remove 1 Enable Authentication Profiles H Profile Name Matheds Modity Remove Profiles n ta s Figure 3 39 Authentication Profiles Page CLI The following is an example of the CLI commands used for configuring Authentication Profiles Console config aaa authentication login default radius local enable none 4 255 Console config ip http authentication radius local 4 259 Console config ip https authentication radius local 4 260 Console config line console 4 377 Console config line login authentication default 4 258 3 99 B Configuring the Switch Mapping Authentication Methods After authentication profiles are defined they ca
465. ode Privileged and User EXEC modes Command Usage There are no user guidelines for this command Example The following example displays the current privilege level for the Privileged EXEC mode console show privilege Current privilege level is 15 Related Commands enable password username VLAN Commands Table 4 33 VLAN Commands default configuration use the no form of this command Command Function Mode Page vlan database Enters the VLAN Configuration mode GC 4 566 vlan Use the vlan VLAN Configuration mode command to createa VC 4 567 VLAN To delete a VLAN use the no form of this command interface vlan Enters the Interface Configuration VLAN mode GC 4 567 interface range vlan Enables simultaneously configuring multiple VLANs GC 4 568 name Adds a name to a VLAN To remove the VLAN name use the no ICV 4 569 form of this command switchport mode Configures the VLAN membership mode ofa port To return to the IC 4 569 4 564 VLAN Commands 4 Table 4 33 VLAN Commands Command Function Mode Page switchportaccess Configures the VLAN ID when the interface is in access mode To IC 4 570 vlan return to the default configuration use the no form of this command switchport trunk Adds or removes VLANs to or from a trunk port IC 4 571 allowed vlan switchport trunk Defines
466. of RADIUS server hosts 3 times Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example configures the number of times the software searches the list of RADIUS server hosts to 5 times console config radius server retransmit 5 Related Commands radius server host radius server key radius server source ip 4 432 Radius Commands 4 radius server timeout radius server deadtime show radius servers radius server source ip The radius server source ip Global Configuration mode command specifies the source IP address used for communication with RADIUS servers To return to the default configuration use the no form of this command Syntax radius server source ip source no radius source ip source source Specifies a valid source IP address Default Setting The source IP address is the IP address of the outgoing IP interface Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example configures the source IP address used for communication with RADIUS servers to 10 1 1 1 console config radius server source ip 10 1 1 1 Related Commands radius server host radius server key radius server retransmit radius server timeout radius server deadtime show radius servers radius server timeout The radius server timeout Global Co
467. of the device If the SNMPv3 engine ID is deleted or the configuration file is erased SNMPv3 cannot be used By default SNMPv1 v2 are enabled on the device SNMPvs3 is enabled only by defining the Local Engine ID If you want to specify your own ID you do not have to specify the entire 32 character engine ID if it contains trailing zeros Specify only the portion of the engine ID up to the point where just zeros remain in the value For example to configure an engine ID of 123400000000000000000000 you can specify snmp server enginelD local 1234 Since the engine ID should be unique within an administrative domain the following is recommended For a standalone device use the default keyword to configure the engine ID For a stackable system configure the engine ID and verify its uniqueness Changing the value of the engine ID has the following important side effect A user s password entered on the command line is converted to an MD5 or SHA security digest This digest is based on both the password and the local 4 457 4 Command Line Interface engine ID The user s command line password is then destroyed as required by RFC 2274 As a result the security digests of SNMPv3 users become invalid if the local value of the engine ID change and the users will have to be reconfigured You cannot specify an engine ID that consists of all 0x0 all OxF or 0x000000001 The show running config Privileged EXEC mode command does not d
468. oftware source interface Specifies the source interface stream Turns on stream processing which enables a raw TCP stream with no Telnet control sequences A stream connection does not process Telnet options and can be appropriate for connections to ports running UNIX to UNIX Copy Program UUCP and other non Telnet protocols Ctrl shift 6 x Return to System Command Prompt Ports Table Keyword Description Port Number BGP Border Gateway Protocol 179 chargen Character generator 19 cmd Remote commands 514 daytime Daytime 13 discard Discard 9 domain Domain Name Service 53 echo Echo 7 exec Exec 512 finger Finger 79 4 539 4 Command Line Interface ftp File Transfer Protocol 21 ftp data FTP data connections 20 gopher Gopher 70 hostname NIC hostname server 101 ident Ident P rotocol 113 irc Internet Relay Chat 194 klogin Kerberos login 543 kshell Kerberos shell 544 login Login 513 Ipd Printer service 515 nntp Network News Transport Protocol 119 pim auto rp PIM Auto R P 496 pop2 Post Office Protocol v2 109 pop3 Post Office Protocol v3 110 smtp Simple Mail Transport Protocol 25 sunrpc Sun Remote Procedure Call 111 syslog Syslog 514 tacacs TAC Access Control System 49 talk Talk 517 telnet Telnet 23 time Time 37 uucp Unix to Unix Copy Program 540 whois Nickname 43 www World Wide Web 80
469. ole config priority queue out num of queues 0 Related Commands wrr queue cos map traffic shape The traffic shape Interface Configuration Ethernet port channel mode command configures the shaper of the egress port queue To disable the shaper use the no form of this command Syntax traffic shape committed rate committed burst no traffic shape committed rate Specifies the average traffic rate CIR in bits per second bps Range 6510 1073741 800 e excess burst Specifies the excess burst size CBS in bytes Default Setting No shape is defined Command Mode Interface Configuration Ethernet port channel mode Command Usage This command activates the shaper on a specified egress port or egress queue Use the command with the burst parameter for GE ports and without the burst parameter for FE ports To activate the shaper on an egress port enter the Interface Configuration mode Then run this command without the queue id parameter The CIR and the CBS will be applied to the specified port To activate the shaper for specific queue run this command with the queue id parameter Example The following example sets a shaper on Ethernet port 1 g4 when the average traffic rate exceeds 124000 bps or the normal burst size exceeds 96000 bps Console config interface ethernet 1 g4 Console config if traffic shape 124000 96000 4 420 QoS Commands 4 Related Commands show q
470. ollowing example configures the interval that the system waits until user input is detected to 20 minutes Console config line console Console config line exec timeout 20 4 379 4 Command Line Interface Related Commands show line history The history Line Configuration mode command enables the command history function To disable the command history function use the no form of this command Syntax history no history Default Setting The command history function is enabled Command Mode Line Configuration mode Command Usage This command enables the command history function for a specified line To enable or disable the command history function for the current terminal session use the terminal history User EXEC mode command Example The following example enables the command history function for telnet Console config line telnet Console config line history Related Commands history size show history show line history size The history size Line Configuration mode command configures the command history buffer size for a particular line To reset the command history buffer size to the default configuration use the no form of this command Syntax history size number of commands no history size number of commands Number of commands that the system records in its history buffer Range 10 216 Default Setting The default history buffer size is 10 4 380 Line Comm
471. ommand Attributes e Region Name User defined STP region name e Revision An unsigned 16 bit number that identifies the revision of the current MSTP configuration The revision number is required as part of the MSTP configuration The possible field range is 0 65535 e Max Hops Specifies the total number of hops that occur in a specific region before the BPDU is discarded Once the BPDU is discarded the port information is aged out The possible field range is 1 40 The field default is 20 hops e IST Master Identifies the Spanning Tree Master instance The IST Master is the specified instance root Web Click Spanning Tree STP MSTP General Define the fields and Click Apply MSTP General Regintome SS Revisiew Bo C T IST Master Figure 3 66 MSTP General Page CLI The following is an example of the MSTP general properties commands Console config spanning tree mst max hops 10 4 484 Defining MSTP Instance Settings MSTP maps VLANs into STP instances Packets assigned to various VLANs are transmitted along different paths within Multiple Spanning Tree Regions MST Regions Regions are one or more Multiple Spanning Tree bridges by which frames can be transmitted In configuring MSTP the MST region to which the device belongs is defined A configuration consists of the name revision and region to 3 153 3 Configuring the Switch which the device belongs Network administrators can de
472. ommand Mode Global Configuration mode Command Usage This command can be used to distribute traffic into different queues where each queue is configured with different Weighted Round Robin WRR and Weighted Random Early Detection WRED parameters It is recommended to specifically map a single VPT to a queue rather than mapping multiple VPTs to a single queue Use the priority queue out num of queues Interface Configuration Ethernet Port channel mode command to enable expedite queues Example The following example maps CoS 7 to queue 2 Console config wrr queue cos map 2 7 Related Commands priority queue out num of queues priority queue out num of queues The priority queue out num of queues Global Configuration mode command configures the number of expedite queues To return to the default configuration use the no form of this command Syntax priority queue out num of queues number of queues no priority queue out num of queues number of queues Specifies the number of expedite queues Expedite queues have higher indexes Range 0 4 Default Setting All queues are expedite queues Command Mode Global Configuration mode Command Usage Configuring the number of expedite queues affects the Weighted Round Robin WRR weight ratio because fewer queues participate in the WRR 4 419 4 Command Line Interface Example The following example configures the number of expedite queues as 0 Cons
473. ommand Mode Interface Configuration Ethernet mode Command Usage During the quiet period the device does not accept or initiate authentication requests The default value of this command should only be changed to adjust for unusual circumstances such as unreliable links or specific behavioral problems with certain clients and authentication servers To provide a faster response time to the user a smaller number than the default value should be entered 4 238 802 1x Commands 4 Example The following example sets the number of seconds that the device remains in the quiet state following a failed authentication exchange to 3600 Console config interface ethernet 1 e16 Console config if dotlx timeout quiet period 3600 Related Commands dot1x port control dot1x re authentication dot1x timeout re authperiod dot1x timeout tx period dot1x max req dot1x timeout supp timeout dot1x timeout server timeout show dot1x show dot1x users dot1x timeout tx period The dot1x timeout tx period Interface Configuration mode command sets the number of seconds that the device waits for a response to an Extensible Authentication Protocol EAP request identity frame from the client before resending the request To return to the default configuration use the no form of this command Syntax dot1x timeout tx period seconds no dot1x timeout tx period seconds Specifies the time in seconds that the device waits for
474. ommand Usage If multicast devices exist on the VLAN do not change the unregistered multicast addresses state to drop on the switch ports 4 278 Address Table Commands 4 If multicast devices exist on the VLAN and IGMP snooping is not enabled the bridge multicast forward all command should be used to enable forwarding all multicast packets to the multicast switches Example The following example enables bridge multicast filtering Console config bridge multicast filtering Related Commands bridge multicast address bridge multicast forbidden address bridge multicast forward all bridge multicast forbidden forward all show bridge multicast filtering bridge multicast address The bridge multicast address Interface Configuration VLAN mode command registers a MAC layer multicast address in the bridge table and statically adds ports to the group To unregister the MAC address use the no form of this command Syntax bridge multicast address mac multicast address ijp multicast address bridge multicast address mac multicast address ip multicast address add remove ethernet interface list port channel port channel number list no bridge multicast address mac multicast address ijp multicast address add Adds ports to the group If no option is specified this is the default option remove Removes ports from the group mac multicast address A valid MAC multicast address ip
475. ommand configures the system location string To remove the location string use the no form of this command Syntax snmp server location text no snmp server location e text Specifies a string that describes system location information Range 0 160 characters Default Setting This command has no default configuration Command Mode Global Configuration mode Command Usage Do not include spaces in the text string or place text that includes spaces inside quotation marks Example The following example defines the device location as New_York console config snmp server location New_York 4 463 4 Command Line Interface Related Commands snmp server contact snmp server set snmp server set The snmp server set Global Configuration mode command defines the SNMP MIB value Syntax snmp server set variable name name1 value name2 value2 variable name MIB variable name name value List of name and value pairs In the case of scalar MIBs only a single pair of name values In the case of an entry in a table at least one pair of name and value followed by one or more fields Default Setting This command has no default configuration Command Mode Global Configuration mode Command Usage Although the CLI can set any required configuration there might be a situation where a SNMP user sets a MIB variable that does not have an equivalent command In order to generate configuration fil
476. ommand sets an IP address To remove an IP address use the no form of this command 4 359 4 Command Line Interface Syntax ip address jp address mask prefix length no ip address p address jip address Valid IP address e mask Valid network mask of the IP address e prefix length Specifies the number of bits that comprise the IP address prefix The prefix length must be preceded by a forward slash Range 8 30 Default Setting No IP address is defined for interfaces Command Mode Interface Configuration Ethernet VLAN port channel mode Command Usage An IP address cannot be configured for a range of interfaces range context Example The following example configures VLAN 1 with IP address 131 108 1 27 and subnet mask 255 255 255 0 Console config interface vlan 1 Console config if ip address 131 108 1 27 255 255 255 0 Related Commands ip default gateway ip address dhcp ip address dhcp The ip address dhcp Interface Configuration Ethernet VLAN port channel mode command acquires an IP address for an Ethernet interface from the Dynamic Host Configuration Protocol DHCP server To deconfigure an acquired IP address use the no form of this command Syntax ip address dhcp hostname host name no ip address dhcp host name Specifies the name of the host to be placed in the DHCP option 12 field This name does not have to be the same as the host name specified in the h
477. ommand starts by sending probe datagrams with a TTL value of one This causes the first device to discard the probe datagram and send back an error message The traceroute command sends several probes at each TTL level and displays the round trip time for each The traceroute command sends out one probe at a time Each outgoing packet may result in one or two error messages A time exceeded error message indicates that an intermediate device has seen and discarded the probe A destination unreachable error message indicates that the destination node has received the probe and discarded it because it could not deliver the packet If the timer goes off before a response comes in the traceroute command prints an asterisk The traceroute command terminates when the destination responds when the maximum TTL is exceeded or when the user interrupts the trace by pressing Esc 4 536 Examples System Management Commands 4 The following example discovers the routes that packets will actually take when traveling to their destination packets Trace complete console console traceroute 192 168 2 5 Tracing the route to 192 168 2 5 192 168 2 5 30 hops max 40 byte Type Esc to abort 1 192 168 2 5 192 168 2 5 lt 20 ms lt 20 ms lt 20 ms The following table describes significant fields shown above Field Description 1 Indicates the sequence number of the device in the path to the host i2 gateway
478. on e default Uses the default list created with the aaa authentication login command list name Uses the indicated list created with the aaa authentication login command Default Setting Uses the default set with the command aaa authentication login Command Mode Line Configuration mode Command Usage Changing login authentication from default to another value may disconnect the telnet session Example The following example specifies the default authentication method for a console Console config line console Console config line login authentication default 4 258 AAA Commands 4 Related Commands aaa authentication login aaa authentication enable show authentication methods enable authentication The enable authentication Line Configuration mode command specifies the authentication method list when accessing a higher privilege level from a remote telnet or console To return to the default configuration specified by the aaa authentication enable command use the no form of this command Syntax enable authentication default ist name no enable authentication default Uses the default list created with the aaa authentication enable command e flist name Uses the indicated list created with the aaa authentication enable command Default Setting Uses the default set with the aaa authentication enable command Command Mode Line Configuration mode Command Usage There are no user
479. on drop policed dscp transmit no police committed rate bps Specifies the average traffic rate CIR in bits per second bps committed burst byte Specifies normal burst size CBS in bytes drop Indicates that when the rate is exceeded the packet is dropped policed dscp transmit Indicates that when the rate is exceeded the DSCP of the packet is remarked according to the policed DSCP map as configured by the qos map policed dscp Global Configuration mode command Default Setting This command has no default configuration Command Mode Policy map Class Configuration mode Command Usage Policing uses a token bucket algorithm CIR represents the speed with which the token is removed from the bucket CBS represents the depth of the bucket Note Policy maps that contain set or trust Policy map Class Configuration commands or that have ACL classifications cannot be attached to an egress interface by using the service policy Ethernet Port channel Interface Configuration mode command 4 414 QoS Commands 4 Example The following example defines a policer for classified traffic When the traffic rate exceeds 124 000 bps or the normal burst size exceeds 96000 bytes the packet is dropped The class is called class1 and is in a policy map called policy1 Console config policy map policyl Console config pmap class classl Console config pmap c police 124000 9600 exceed action drop
480. on between the device and the TACACS server Single Connection Maintains a single open connection between the device and the TACACS server The possible field values are e Checked Enables a single connection e Unchecked Disables a single connection Removes Removes TACACS server The possible field values are e Checked Removes the selected TACACS server e Unchecked Maintains the TACACS servers Web Click System WebViewMgmt Authentication TACACS define the fields and click Apply 3 104 Defining Access Profiles 3 TACACS Datani Parameters Seance P Adhem 0000 Key Suing Timeout tor Reply E o Host Semce Authentication Timesst Single P Atte PY IP Addes Port bos Reply Connection SUA Medity Remove 9 2222 Net Comected A c Figure 3 42 TACACS Page CLI The following is an example of the TACACS CLI Commands Console config tacacs server host 172 16 1 1 4 552 Console config tacacs server key 4 553 Console config tacacs server timeout 30 4 553 Console config tacacs server source ip 172 16 8 1 4 554 Configuring Port Security Network security can be increased by limiting access on a specific port only to users with specific MAC addresses The MAC addresses can be dynamically learned or statically configured Locked port security monitors both received and learned packets that are received on specific ports Access to the locked port is limited to users
481. on file type to which to the file is downloaded The possible field values are e Software Image Downloads the Image file Boot Code Downloads the Boot file Download to Master Only Downloads the system file only to the Master Download to All Units Downloads the system file to all units Configuration Download Indicates that the download is for configuration files If Configuration Download is selected the Firmware Download fields are grayed out Configuration TFTP Server IP Address Specifies the TFTP Server IP Address from which the configuration files are downloaded Configuration Source File Name Specifies the configuration files to be downloaded Configuration Destination File Specifies the destination file to which to the configuration file is downloaded The possible field values are Running Configuration Downloads commands into the Running Configuration file Startup Configuration Downloads the Startup Configuration file and overwrites the old Startup Configuration file 3 52 Downloading System Files 3 Web Click System System Mgmt File Management File Download Define the fields Click Apply WebView Figure 3 14 File Download Page CLI The following is an example of downloading system files using CLI commands Console copy tftp 172 16 101 101 filel image4 315 Accessing file filel on 172 16 101 101 Loading filel from 172 16 101 101 TIGPELEE
482. on or registration on the port To allow dynamic registration of VLANs on a port use the no form of this command Clear gvrp statistics Clears all GVRP statistical information PE 4 348 show gvrp Displays GVRP configuration information including timer values UE 4 348 configuration whether GVRP and dynamic VLAN creation is enabled and which ports are running GVRP show gvrp statistics Displays GVRP statistics UE 4 349 show gvrp Displays GVRP error statistics UE 4 350 gvrp enable Global GARP VLAN Registration Protocol GVRP is an industry standard protocol designed to propagate VLAN information from device to device With GVRP a single device is manually configured with all desired VLANs for the network and all other devices on the network learn these VLANs dynamically The gvrp enable Global Configuration mode command enables GVRP globally To disable GVRP on the device use the no form of this command Syntax gvrp enable no gvrp enable Default Setting GVRP is globally disabled Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example enables GVRP globally on the device Console config gvrp enable 4 344 GVRP Commands 4 Related Commands gvrp enable Interface gvrp enable Interface The gvrp enable Interface Configuration Ethernet port channel mode command enables GVRP on an interface To di
483. onds press RETURN or Esc to abort and enter prom The Startup menu is displayed and contains the following configuration functions 1 Download Software 2 Erase Flash File 3 Erase Flash Sectors 4 Password Recovery Procedure 5 Enter Diagnostic Mode 6 Back Enter your choice or press ESC to exit 2 27 20 Initial Configuration The following sections describe the Startup menu options If no selection is made within 25 seconds default the switch times out and the device continues to load normally Only technical support personnel can operate the Diagnostics Mode For this reason the Enter Diagnostic Mode option of the Startup menu is not described in this guide Download Software Use the software download option when a new software version must be downloaded to replace corrupted files update or upgrade the system software To download software from the Startup menu 1 On the Startup menu press 1 The following prompt is displayed Downloading code using XMODEM 2 When using HyperTerminal click Transfer on the HyperTerminal menu bar 3 From the Transfer menu click Send File The Send File window is displayed Send File HE Folder Filename Browse Protocol modem hd Close Cancel Figure 2 2 Send File window 4 Enter the file path for the file to be downloaded 5 Ensure the protocol is defined as Xmodem 6 Click Send The software is
484. onfiguration in order to synchronize local clocks within the subnet and to national time standards via wire or radio Out of Band Management Management of the network from a station not attached to the network Port Authentication See IEEE 802 1x Port Mirroring A method whereby data on a target port is mirrored to a monitor port for troubleshooting with a logic analyzer or RMON probe This allows data on the target port to be studied unobstructively Port Trunk Defines a network link aggregation and trunking method which specifies how to create a single high speed logical link that combines several lower speed physical links Private VLANs Private VLANs provide port based security and isolation between ports within the assigned VLAN Data traffic on downlink ports can only be forwarded to and from uplink ports Remote Authentication Dial in User Service RADIUS RADIUS is a logon authentication protocol that uses software running on a central server to control access to RADIUS compliant devices on the network Glossary 614 Glossary Remote Monitoring RMON RMON provides comprehensive network monitoring capabilities It eliminates the polling required in standard SNMP and can set alarms on a variety of traffic conditions including specific error types Rapid Spanning Tree Protocol RSTP RSTP reduces the convergence time for network topology changes to about 10 of that required by the older IEEE 802 1D STP sta
485. onfigure the classification criteria for the specified class If two match Class map Configuration mode commands are entered each should point to a different type of ACL e g one to an IP ACL and one to a MAC ACL Since packet classification is based on the order of the classification criteria the order in which the match Class Map Configuration mode commands are entered is important If there is more than one match statement in a match all class map and the same classification field appears in the participating ACLs an error message is generated Note Aclass map in match all mode cannot be configured if it contains both an IP ACL and a MAC ACL with an ether type that is not 0x0800 Note Class map can be defined only in QoS Advanced mode Example The following example creates a class map called class1 and configures it to check that packets match all classification criteria in the class map match statement Console config class map class1 match all Console config cmap Related Commands show class map show class map The show class map User EXEC mode command displays all class maps Syntax show class map class map name class map name Specifies the name of the class map to be displayed Default Setting This command has no default configuration 4 408 QoS Commands 4 Command Mode User EXEC mode Command Usage There are no user guidelines for this command Example The following examp
486. ontrol entries The possible field values are Checked Removes the selected History Control entry e Unchecked Maintains the current History Control entries Web Click System RMON History History Control and select an interface History Control MAY Cowco Sampling Samper Current Number of fey Nasnoce Omnes Medity Nemeve 1 2 oe Figure 3 103 RMON History Control Page 3 214 Managing RMON Statistics 3 CLI The following is an example of the CLI commands used to view RMON History Control statistics Console config interface ethernet 1 el 4 323 Console config if rmon collection history 1 interval 2400 4 439 Viewing the RMON History Table The RMON History Table Page contains interface specific statistical network samplings Each table entry represents all counter values compiled during a single sample Command Attributes e History Entry No Displays the entry number for the History Control Table page e Owner Displays the RMON station or user that requested the RMON information The field range is 0 20 characters Sample Number Indicates the sample number from which the statistics were taken Drop Events Displays the number of dropped events that have occurred on the interface since the device was last refreshed e Received Bytes Octets Displays the number of octets received on the interface since the device was last refreshed This number includes bad pack
487. ooping Enable Internet Group Management Protocol IGMP snooping 4 351 Commands IP Addressing Commands Define a default gateway setan IP address for interface delete entries 4 359 from the host LACP Commands Configure system or port priority 4 371 Line Commands Display line parameters enable the command history function or 4 377 onfigure the command history buffer size Management ACL Define a permit or deny rule or configure a management access list 4 384 Commands PHY Diagnostics Display the optical transceiver diagnostics 4 389 Commands Port Channel Commands Enter the interface configuration mode to configure a specific or 4 393 multiple port channel Port Monitor Commands Start a port monitoring session or display the port monitoring status 4 396 Power over Ethernet Configure the inline power management or the threshold for initiating 4 398 Commands inline power usage alarms QoS Commands Enable quality of service QoS on the device create policy maps and 4 405 define traffic classifications Radius Commands Specify the source IP address used for communication with RADIUS 4 429 servers and display the RADIUS server settings RMON Commands Display RMON Ethernet history statistics or alarms table and 4 436 configuration SNMP Commands Configure the community access string to permitaccess to the SNMP 4 451 4 230 802 1x Commands 4 Table 4 4 Command Groups Command Group Description Page
488. ooping mrouter time out e time out Multicast device timeout in seconds Range 1 2147483647 Default Setting The default value is 300 seconds Command Mode Interface Configuration VLAN mode Command Usage There are no user guidelines for this command Example The following example configures the multicast device timeout to 200 seconds Console config interface vlan 2 Console config if ip igmp snooping mrouter time out 200 4 354 IGMP Snooping Commands 4 Related Commands ip igmp snooping Global show ip igmp snooping mrouter ip igmp snooping leave time out show ip igmp snooping interface show ip igmp snooping groups ip igmp snooping leave time out The ip igmp snooping leave time out Interface Configuration VLAN mode command configures the leave time out If an IGMP report for a multicast group was not received for a leave time out period after an IGMP Leave was received from a specific port this port is deleted from the member list of that multicast group To return to the default configuration use the no form of this command Syntax ip igmp snooping leave time out time out immediate leave no ip igmp snooping leave time out e time out Specifies the leave time out in seconds for IGMP queries Range 0 2147483647 immediate leave Indicates that the port should be immediately removed from the members list after receiving IGMP Leave Default Setting The default leave time ou
489. opper Up 100m Disable Auto 7 6 Wet 1000M copper Up yooom Orsable Auto r LLE Wet 1000M copper Up 100M Dre ate Ato ta w Wel 1000M copper Up 000m Otsable Auto 7 Weta 1000M copper Up 100M4 Drsabie Ato 2 mM 1000M copper Up 10M Disadie Aito n W21 1000M copper Up 100M Disable Aito rs s Figure 3 52 Interface Configuration Page CLI The following is an example of the Port Configuration CLI commands Console set interface active ethernet 1 e5 4 332 Console config interface ethernet 1 e5 4 323 Console config if description RD SW 3 4 325 Console config if speed 100 4 326 Console config if duplex full4 327 Console config if negotiation 4 328 Console config if flowcontrol on 4 329 Console config if mdix auto 4 329 Console config if back pressure 4 330 Creating Trunks Link Aggregation optimizes port usage by linking a group of ports together to form a single LAG aggregated group Aggregating ports multiplies the bandwidth between the devices increases port flexibility and provides link redundancy The device supports up to eight ports per LAG and eight LAGs per system The device supports both static LAGs and Link Aggregation Control Protocol LACP LAGs LACP LAGs negotiate aggregating ports links with other LACP ports located on a different device If the other device ports are also LACP ports the devices establish a LAG between them Consider the following when aggregating port
490. or Reply Defines the amount of time in seconds the device waits for an answer from the RADIUS server before retrying the query or switching to the next server The possible field values are 1 30 Three is the default value Dead Time Defines the amount of time in minutes that a RADIUS server is bypassed for service requests The range is 0 2000 The default is 0 minutes Source IP Address Defines the source IP address that is used for communication with RADIUS servers Usage Type Specifies the RADIUS server authentication type The default value is All The possible field values are e Log in The RADIUS server is used for authenticating user name and passwords 802 1X The RADIUS server is used for 802 1X authentication 3 102 Defining Access Profiles 3 e All The RADIUS server is used for authenticating user names and passwords and 802 1X port authentication e Remove Removes a RADIUS server The possible field values are e Checked Removes the selected RADIUS server e Unchecked Maintains the RADIUS servers Web Click System WebViewMgmt Authentication RADIUS define the fields and click Apply P Tmeowttor Repa P e Dead Time 02000 J Mn Key Suing M 18 smat O Somce IP Addiows E P Autres Addres PUY pon LILE ES Figure 3 41 RADIUS Page nication Number of Timecut Dead Source Usage Rewles tes Reply Time IP Address Type Modity Remove 2 G CLI The fol
491. or removing a stack member the Master unit initiates a stacking discovering process Note If two members are discovered with the same Unit ID the stack continues to function however only the unit with the older join time joins the stack A message is sent to the user notifying that a unit failed to join the stack Removing and Replacing Stacking Members Stacking member 1 and Stacking member 2 are Stacking Master enabled units Unit 1 and Unit 2 are either designated as Master Unit or Secondary Master Unit The Stacking Master assignment is performed during the configuration process One Master enabled stack member is elected Master and the other Master enabled stack member is elected Secondary Master according to the following decision process e If only one Stacking Master enabled unit is present it is elected Stacking Master e If two Stacking Masters enabled stacking members are present and one has been manually configured as the Stacking Master the manually configured member is elected Stacking Master e If two Master enabled units are present and neither has been manually configured as the Stacking Master the one with the longer up time is elected Stacking Master 3 37 B Configuring the Switch Ifthe two Master enabled stacking members are the same age Unit 1 is elected Stacking Master Two stacking member are considered the same age if they were inserted within the same ten minute interval For example Stack memb
492. or this command Example The following example displays all policy maps Console gt show policy map Policy Map policyl class class1 set Ip dscp 7 Policy Map policy2 class class 2 police 96000 4800 exceed action drop class class3 police 124000 96000 exceed action policed dscp transmit Related Commands policy map service policy trust cos dscp The trust cos dscp Policy map Class Configuration mode command configures the trust state The trust state determines the source of the internal DSCP value used by Quality of Service QoS To return to the default configuration use the no form of this command Syntax trust cos dscp no trust cos dscp Default Setting The port is not in the trust mode If the port is in trust mode the internal DSCP value is derived from the ingress packet Command Mode Policy map Class Configuration mode 4 412 QoS Commands 4 Command Usage Action serviced to a class so that if an IP packet arrives the queue is assigned per DSCP If a non IP packet arrives the queue is assigned per CoS VPT Example The following example configures the trust state for a class called class1 in a policy map called policy1 Console config policy map policyl Console config pmap class class1l Console config pmap c trust cos dscp Related Commands set set The set Policy map Class Configuration mode command sets new values in the IP packet Syntax set dscp
493. ore modifying a policy for an existing class or creating a policy for a new class use the policy map Global Configuration mode command to specify the name of the policy map to which the policy belongs and to enter the Policy map Configuration mode Use the service policy Ethernet Port channel Interface Configuration mode command to attach a policy map to an interface Use an existing class map to attach classification criteria to the specified policy map and use the access group parameter to modify the classification criteria of the class map If this command is used to create a new class map the name of an IP or MAC ACL must also be specified Example The following example defines a traffic classification called class1 with an access group called Alcatel The class is in a policy map called policy1 Console config policy map policyl Console config pmap class classl access group Alcatel Related Commands show policy map service policy show policy map The show policy map User EXEC command displays the policy maps Syntax show policy map policy map name class class name policy map name Specifies the name of the policy map to be displayed 4 411 4 Command Line Interface class name Specifies the name of the class whose QoS policies are to be displayed Default Setting This command has no default configuration Command Mode User EXEC mode Command Usage There are no user guidelines f
494. ority Rate Limiting define the fields and click Apply Bandwidth Configuration S Interface Ingress Rate Limit Egress Shaping Rates Edit Status Rate Limit OR os ol Enatie 102400 64 ba VNSSSSSSSSSNSSSSSSS 3 180 Configuring Quality of Service 3 Figure 3 81 Bandwidth Configuration Page CLI The following is an example of the CLI commands used to configure rate limiting Console config interface ethernet 1 e5 4 323 Console config if traffic shape 124000 96000 4 420 Mapping CoS Values to Queues The IP Precedence Page contains fields for classifying CoS settings to traffic queues Command Attributes e Class of Service Specifies the CoS priority tag values where zero is the lowest and 4 is the highest Queue Defines the traffic forwarding queue to which the CoS priority is mapped Four traffic priority queues are supported Restore Defaults Restores the device factory defaults for mapping CoS values to a forwarding queue Web Click Policy Priority Mapping IP Precedence define the fields and click Apply ta fa ta ta fa ta ea Figure 3 82 IP Precedence Page CLI The following is an example of the CLI commands used CoS values to forwarding queues 3 181 B Configuring the Switch Console config wrr queue cos map 2 7 4 418 Mapping DSCP Values to Queues The DSCP Priority Page contains fields for classifying DSCP settings to traffic que
495. ork optimizes network performance The device supports the following QoS modes e Basic e Advanced Class Of Service 802 1p Support The IEEE 802 1p signaling technique is an OSI Layer 2 standard for marking and prioritizing network traffic at the data link MAC sub layer 802 1p traffic is classified and sent to the destination No bandwidth reservations or limits are established or enforced 802 1p is a spin off of the 802 1Q Vlans standard 802 1p establishes eight levels of priority similar to the IP Precedence IP Header bit field Quality of Service Basic Mode In the Basic QoS mode it is possible to activate a trust mode to trust VPT DSCP TCP UDP or none In addition a single Access Control List can be attached to an interface Web Based Management With web based management the system can be managed from any web browser The system contains an Embedded Web Server EWS which serves HTML pages through which the system can be monitored and configured The system internally converts web based input into configuration commands MIB variable settings and other management related settings Remote Monitoring Remote Monitoring RMON is an extension to SNMP which provides comprehensive network traffic monitoring capabilities as opposed to SNMP which allows network device management and monitoring RMON is a standard MIB that defines current and historical MAC layer statistics and control objects allowing real time info
496. ork segment with no other STA compliant bridging device is always forwarding If two ports of a switch are connected to the same segment and there is no other STA device attached to this segment the port with the smaller ID forwards packets and the other is discarding All ports are discarding when the switch is booted then some of them change state 3 148 Defining Spanning Tree 3 to learning and then to forwarding Command Attributes e Port The interface for which the information is displayed e STP Status Indicates if STP is enabled on the port The possible field values are e Enabled Indicates that STP is enabled on the port Disabled Indicates that STP is disabled on the port e Fast Link Indicates if Fast Link is enabled on the port If Fast Link mode is enabled for a port the Port State is automatically placed in the Forwarding state when the port link is up Fast Link optimizes the STP protocol convergence STP convergence can take 30 60 seconds in large networks e Root Guard Prevents devices outside the network core from being assigned the spanning tree root e Port State Displays the current STP state of a port If enabled the port state determines what forwarding action is taken on traffic Possible port states are Disabled Indicates that STP is currently disabled on the port The port forwards traffic while learning MAC addresses e Blocking Indicates that the port i
497. os dscp mutation Default Setting This command has no default configuration Command Mode Global Configuration mode Command Usage The DSCP to DSCP mutation map is applied to a port at the boundary of a Quality of Service QoS administrative domain If two QoS domains have different DSCP definitions use the DSCP to DSCP mutation map to match one set of DSCP values with the DSCP values of another domain Apply the DSCP to DSCP mutation map only to ingress and to DSCP trusted ports Applying this map to a port causes IP packets to be rewritten with newly mapped DSCP values at the ingress ports If the DSCP to DSCP mutation map is applied to an untrusted port class of service CoS or IP precedence trusted port this command has no immediate effect until the port becomes DSCP trusted Example The following example applies the DSCP Mutation map to system DSCP trusted ports Console config qos dscp mutation Related Commands qos map dscp mutation qos map dscp mutation The qos map dscp mutation Global Configuration mode command modifies the DSCP to DSCP mutation map To return to the default DSCP to DSCP mutation map use the no form of this command Syntax qos map dscp mutation in dscp to out dscp no qos map dscp mutation 4 428 Radius Commands 4 in dscp Specifies up to 8 DSCP values separated by spaces Range 0 63 e out dscp Specifies up to 8 DSCP values separated by spaces Range 0
498. os interface show qos interface The show qos interface User EXEC mode command displays Quality of Service QoS information on the interface Syntax show qos interface ethernet interface number port channel number buffers queueing policers shapers e interface number Valid Ethernet port number number Valid port channel number e buffers Displays the buffer setting for the interface s queues Displays the queue depth for each queue and the thresholds for the WRED queuing Displays the queue strategy WRR or EF the weight for WRR queues the CoS to queue map and the EF priority e shapers Displays the shaper of the specified interface and the shaper for the queue on the specified interface policers Displays all the policers configured for this interface their setting and the number of policers currently unused Default Setting There is no default configuration for this command Command Mode User EXEC mode Command Usage If no keyword is specified port QOS mode e g DSCP trusted CoS trusted untrusted default CoS value DSCP to DSCP mutation map attached to the port and policy map attached to the interface are displayed If no interface is specified QoS information about all interfaces is displayed Example The following example displays the buffer settings for queues on Ethernet port 1 e1 4 421 4 Command Line Interface console show qos interface buffers ethernet
499. ostname Global Configuration mode command Range 1 20 characters Default Setting This command has no default configuration 4 360 IP Addressing Commands 4 Command Mode Interface Configuration Ethernet VLAN port channel mode Command Usage The ip address dhcp command allows any interface to dynamically learn its IP address by using the DHCP protocol Some DHCP servers require that the DHCPDISCOVER message have a specific host name The ip address dhcp hostname host name command is most typically used when the host name is provided by the system administrator If the device is configured to obtain its IP address from a DHCP server it sends a DHCPDISCOVER message to provide information about itself to the DHCP server on the network If the ip address dhcp command is used with or without the optional keyword the DHCP option 12 field host name option is included in the DHCPDISCOVER message By default the specified DHCP host name is the globally configured host name of the device However the ip address dhcp hostname host name command can be used to place a different host name in the DHCP option 12 field The no ip address dhcp command deconfigures any IP address that was acquired thus sending a DHCPRELEASE message Example The following example acquires an IP address for Ethernet port 1 e16 from DHCP Console config interface ethernet 1 e16 Console config if ip address dhcp Related Commands ip
500. otiation To restore the default configuration use the no form of this command Syntax speed 10 100 1000 no speed 10 Forces10 Mbps operation 100 Forces 100 Mbps operation 1000 Forces 1000 Mbps operation Default Setting Maximum port capability Command Mode Interface Configuration Ethernet port channel mode Command Usage The no speed command in a port channel context returns each port in the port channel to its maximum capability Example The following example configures the speed operation of Ethernet port 1 e5 to 100 Mbps operation Console config interface ethernet 1 e5 Console config if speed 100 Related Commands shutdown duplex 4 326 Ethernet Configuration Commands 4 negotiation flowcontrol mdix back pressure show interfaces configuration show interfaces status duplex The duplex Interface Configuration Ethernet mode command configures the full half duplex operation of a given Ethernet interface when not using auto negotiation To restore the default configuration use the no form of this command Syntax duplex half full no duplex e half Forces half duplex operation e full Forces full duplex operation Default Setting The interface is set to full duplex Command Mode Interface Configuration Ethernet mode Command Usage When configuring a particular duplex mode on the port operating at 10 100 Mbps disable the auto ne
501. ource for the system clock Use no GC 4 301 form of this command to disable external time source clock summer time Configures the system to automatically switch to summer time GC 4 302 daylight saving time To configure the software not to automatically switch to summer time use the no form of this command 4 298 Clock Commands 4 Table 4 10 Clock Commands Command Function Mode Page sntp Defines an authentication key for Simple Network Time Protocol GC 4 303 authentication key SNTP To remove the authentication key for SNTP use the no form of this command sntp authenticate Grants authentication for received Simple Network Time Protocol GC 4 304 SNTP traffic from servers To disable the feature use the no form of this command sntp trusted key Sets the amount of time the management console is inaccessible GC 4 305 after the number of unsuccessful logon attempts exceeds the threshold set by the password thresh command sntp client poll timer Sets the polling time for the Simple Network Time Protocol GC 4 306 SNTP client To return to default configuration use the no form of this command sntp broadcastclient Enables Simple Network Time Protocol SNTP broadcastclients GC 4 306 enable To disable SNTP broadcast clients use the no form of this command sntp anycast client Enables SNTP anycastclient To disable the SNT
502. packet to detect an adjacent switch and then waits for a response Common The port has detected an adjacent switch and periodically sends Hello packets to determine that it is still present e Passive A port enters this state if there is no response to a Discovery hello packet This is a receive only state and no Hello packets are transmitted If a Hello packet is received from an adjacent switch the port enters the Common state and then transmits a Hello packet in reply Use the AMAP Global Configuration screen to enable disable AMAP and configure timeout parameters Table 4 9 AMAP Commands Command Function Mode Page amap enable Enables or disables AMAP on the switch GC 4 296 amap run This performs the same function as the amap enable command GC 4 296 anep discovery Sets the discovery transmission time interval GC 4 297 mer amap common timer Sets the common phase transmission time interval GC 4 297 show amap Displays the current AMAP settings PE 4 298 4 295 4 Command Line Interface amap enable The amap global configuration mode enables AMAP on the switch Use the amap disable command to disable the feature Syntax amap enable disable enable Enables AMAP e disable Disables AMAP Default Setting Enabled Command Mode Global Configuration Mode Command Usage There are no user guidelines for this command Example The followi
503. parameters 4 225 4 Command Line Interface Show Commands If you enter a at the command prompt the system will display the first level of keywords for the current command class Normal Exec or Privileged Exec or configuration class Global ACL Interface Line VLAN Database or MSTP You can also display a list of valid keywords for a specific command For example the command show displays a list of possible show commands The command show interfaces will display the following information Console show interfaces counters Information of interfaces counters protocol vlan Protocol vlan information status Information of interfaces status switchport Information of interfaces switchport Console Partial Keyword Lookup If you terminate a partial keyword with a question mark alternatives that match the initial letters are provided Remember not to leave a space between the command and question mark For example s shows all the keywords starting with s Console show s snmp sntp spanning tree ssh startup config system Console Negating the Effect of Commands For many configuration commands you can enter the prefix keyword no to cancel the effect of a command or reset the configuration to the default value For example the logging command will log system messages to a host server To disable logging specify the no logging command This guide describes the ne
504. plays the selected MIB variable value Sample Type Defines the sampling method for the selected variable and comparing the value against the thresholds The possible field values are Delta Subtracts the last sampled value from the current value The difference in the values is compared to the threshold Absolute Compares the values directly with the thresholds at the end of the sampling interval e Rising Threshold Displays the rising counter value that triggers the rising threshold alarm The rising threshold is presented on top of the graph bars Each monitored variable is designated a color e Rising Event Displays the mechanism in which the alarms are reported The possible field values are e LOG Indicates there is not a saving mechanism for either the device or in the management system If the device is not reset the entry remains in the Log Table e TRAP Indicates that an SNMP trap is generated and sent via the Trap mechanism The Trap can also be saved using the Trap mechanism e Both Indicates that both the Log and Trap mechanisms are used to report alarms Falling Threshold Displays the falling counter value that triggers the falling threshold alarm The falling threshold is graphically presented on top of the graph bars Each monitored variable is designated a color e Falling Event Displays the mechanism in which the alarms are reported Startup Alarm Displays th
505. ple configures an MST region config spanning tree mst configuration config mst instance 1 add vlan 10 20 config mst name regionl config mst revision 1 console console console console Related Commands spanning tree mst priority spanning tree mst max hops spanning tree mst port priority spanning tree mst cost instance mst name mst revision mst show mst exit mst abort mst show spanning tree instance mst The instance MST Configuration mode command maps VLANs to an MST instance Syntax instance instance id add remove vlan vian range e instance ID ID of the MST instance Range 1 16 e vian range VLANSs to be added to or removed from the specified MST instance To specify a range of VLANs use a hyphen To specify a series of VLANs use a comma Range 1 4094 Default Setting VLANs are mapped to the common and internal spanning tree CIST instance instance 0 Command Modes MST Configuration mode 4 488 Spanning Tree Commands 4 Command Usage All VLANs that are not explicitly mapped to an MST instance are mapped to the common and internal spanning tree CIST instance instance 0 and cannot be unmapped from the CIST For two or more devices to be in the same MST region they must have the same VLAN mapping the same configuration revision number and the same name Example The following example maps VLANs 10 20 to MST instance 1 console confi
506. pond Frames Receive Indicates the number of valid EAP Response frames received on the port e Request ID Frames Transmit Indicates the number of EAP Req Id frames transmitted via the port e Request Frames Transmit Indicates the number of EAP Request frames transmitted via the port e Invalid Frames Receive Indicates the number of unrecognized EAPOL frames that have been received by on this port e Length Error Frames Receive Indicates the number of EAPOL frames with an invalid Packet Body Length received on this port e Last Frame Version Indicates the protocol version number attached to the most recently received EAPOL frame Last Frame Source Indicates the source MAC address attached to the most recently received EAPOL frame Web Click Security 802 1x Statistics and select an interface 3 118 3 WebView Frames Receive Frames Tianshi Start Frames Recelve Leg off Frames Receive Respond ID Frames Receive Respond Frames Recebre Request ID Frames Tram Request Frames Trammi barvali Frames Receive Length Enes Frames Recelve Lant Frame Version Laut Frame Somce Figure 3 48 802 1X Statistic Page CLI The following is an example of the 802 1X Statistics CLI commands Console show dot1x statistics ethernet 1 el 4 248 EapolFramesRx 11 EapolFramesTx 12 EapolStartFramesRx 12 EapolLogoffFramesRx 1 EapolRespIdFramesRx 3 EapolRespFramesRx 6 EapolReqIidFramesTx 3 Eapol
507. port enters this state if there is no response to a Discovery hello packet This is a receive only state and no Hello packets are transmitted If a Hello packet is received from an adjacent switch the port enters the Common state and then transmits a Hello packet in reply Command Attributes AMAP Status Enables or disables AMAP on the switch Default enabled Discovery Timeout Interval Sets the time the switch will wait before sending a Hello packet to detect an adjacent switch Range 1 65535 seconds Common Timeout Interval After detecting an adjacent switch this sets the time the switch will wait before sending a further Hello packet to determine if the adjacent switch is still connected Range 1 65535 seconds Web Click System Network Discovery AMAP Settings Select whether to enable AMAP enter the desired timeout intervals and click Apply 3 139 Configuring the Switch AMAP Status F Enabled Discovery Timeout Interval 300 Common Timeout Interval 30 Sec Figure 3 59 AMAP Configuration Page CLI The following is an example of the AMAP CLI commands Console config amap enable 4 294 Console config amap run Console config amap discovery timer 3000 4 294 Console config amap common timer 5000 4 295 Viewing Adjacencent Devices The AMAP Adjacencies Page provides information about the current network topology For example the Ad
508. port is currently operating e Down Indicates the port is currently not operating Port Speed Displays the configured rate for the port The port type determines what speed setting options are available Port speeds can only be configured when auto negotiation is disabled The possible field values are e 10 Indicates the port is currently operating at 10 Mbps e 100 Indicates the port is currently operating at 100 Mbps e 1000 Indicates the port is currently operating at 1000 Mbps e Duplex Mode Displays the port duplex mode This field is configurable only when auto negotiation is disabled and the port speed is set to 10M or 100M This field cannot be configured on LAGs The possible field values are e Full The interface supports transmission between the device and its link partner in both directions simultaneously e Half The interface supports transmission between the device and the client in only one direction at a time e Auto Negotiation Displays the auto negotiation status on the port Auto negotiation is a protocol between two link partners that enables a port to advertise its transmission rate duplex mode and flow control abilities to its partner 3 126 Configuring Interface Connections 3 Advertisement Defines the auto negotiation setting the port advertises The possible field values are e Max Capability Indicates that all port speeds and duplex mode settings are accepted
509. properties commands Console config power inline usage threshold 80 4 401 Console config power inline traps enable 4 402 Console config end Console show power inline Power On Nominal Power 150 Watt Consumed Power 120 Watts 80 Usage Threshold 95 Traps Enabled 4 402 3 43 B Configuring the Switch Defining PoE Interfaces The PoE Interface Page contains information for configuring PoE interfaces including the interface PoE operation status and the interface s power consumption Command Attributes e Port Indicates the specific interface for which PoE parameters are defined and assigned to the powered interface connected the to selected port e Admin Status Indicates the device PoE mode The possible field values are e Auto Enables the Device Discovery protocol and provides power to the device using the PoE module The Device Discovery Protocol enables the device to discover Powered Devices attached to the device interfaces and to learn their classification This is the default settings e Never Disables the Device Discovery protocol and stops the power supply to the device using the PoE module e Operation Status Indicates if the port is enabled to work on PoE The possible field values are e On Indicates the device is delivering power to the interface e Off Indicates the device is not delivering power to the interface e Test Fail Indicates the powered dev
510. r Ful 00 Enabled Off Up Disabled Auto e18 00OM Copper Ful 00 Enabled Off Up Disabled Auto e19 00M Copper Ful 00 Enabled off Up Disabled Auto Related Commands shutdown speed duplex negotiation flowcontrol mdix back pressure show interfaces status show interfaces status The show interfaces status Privileged EXEC mode command displays the status of all configured interfaces Syntax show interfaces status ethernet interface port channel port channel number e interface A valid Ethernet port Full syntax unit port e port channel number A valid port channel number Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays the status of all configured interfaces Console show interfaces status 4 335 4 Command Line Interface Port Type Jel 00M Copper e2 00M Copper e3 00M Copper e4 00M Copper e5 00M Copper e6 00M Copper e7 00M Copper e8 00M Copper e9 00M Copper e10 00M Copper fell 00M Copper e12 00M Copper e13 00M Copper e14 00M Copper e15 00M Copper e16 00M Copper e17 00M Copper e18 00M Copper e19 00M Copper Related Commands shutdown speed duplex negotiation flowcontrol mdix back pressure Duplex show interfaces configuration 4 336 Speed Neg Flow Ctrl Li
511. r defining VLANs including VLAN 3 157 groups GARP and GVRP Multicast Provides information for configuring Multicast Groups Multicast 3 192 Forwarding and IGMP snooping Policy Priority Provides information for configuring port priorities and queue 3 174 values Basic Mode Provides information for configuring the QoS basic mode 3 177 Advanced Mode Provides information for configuring the QoS advanced mode 3 177 Managing Device Information You can easily identify the system by displaying the device name location and contact information 3 34 Managing Device Information 3 Command Attributes Model Name Displays the device model number and name System Name Defines the user defined device name The field range is 0 160 characters System Location Defines the location where the system is currently running The field range is 0 160 characters System Contact Defines the name of the contact person The field range is 0 160 characters System Object ID Displays the vendor s authoritative identification of the network management subsystem contained in the entity System Up Time Displays the amount of time since the most recent device reset The system time is displayed in the following format Days Hours Minutes and Seconds For example 41 days 2 hours 22 minutes and 15 seconds Base MAC Address Displays the device MAC address Hardware Version Displays the installed devic
512. r of authentication key to be trusted Range 1 4294967295 Default Setting No keys are trusted Command Mode Global Configuration mode Command Usage The command is relevant for both received unicast and broadcast If there is at least 1 trusted key then unauthenticated messages will be ignored Example The following example authenticates key 8 Console config sntp authentication key 8 md5 ClkKey Console config sntp trusted key 8 Console config sntp authenticate Related Commands sntp authentication key sntp authenticate sntp client poll timer sntp broadcast client enable sntp anycast client enable sntp unicast client enable sntp unicast client poll 4 305 4 Command Line Interface sntp client poll timer The sntp client poll timer Global Configuration mode command sets the polling time for the Simple Network Time Protocol SNTP client To return to default configuration use the no form of this command Syntax sntp client poll timer seconds no sntp client poll timer seconds Polling interval in seconds Range 60 86400 Default Setting Polling interval is 1024 seconds Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example sets the polling time for the Simple Network Time Protocol SNTP client to 120 seconds Console config sntp client poll timer 120 Related Commands sntp authentication ke
513. r which ARP parameters are displayed The possible field values are e Port The port for which ARP parameters are defined e LAG The LAG for which ARP parameters are defined e VLAN The VLAN for which ARP parameters are defined IP Address Indicates the station IP address which is associated with the MAC address filled in below e MAC Address Displays the station MAC address which is associated in the ARP table with the IP address e Status Displays the ARP table entry type Possible field values are e Dynamic The ARP entry is learned dynamically e Static The ARP entry is a static entry e Remove Removes a specific ARP entry The possible field values are e Checked Removes the selected ARP entries Unchecked Maintains the current ARP entries Web Click ISystem IP Addressing ARP define the fields and and specify a Primary interface click Apply ARP Esay Age Out feocoo Sec Cleat ARP Table Enmles Nore J Intertace IP Address MAC Address Stamm Remove 1 c ea Aeon 3 50 Managing System Files 3 Figure 3 13 ARP Page CLI The following is an example of the ARP CLI commands Console config arp 198 133 219 232 00 00 0c 40 0f bc ethernet 1 e6 4 363 Managing System Files You can upload download firmware to or from a TFTP server By saving runtime code to a file on a TFTP server that file can later be downloaded to the switch to restore
514. rC SetValue var rlIfProfileName mismatching between var mib type and object type 4 N A N A N A N A N A N A N A N A N A N A console Related Commands qos map policed dscp qos map dscp queue Command Usage The wrr queue threshold Global Configuration mode command assigns queue thresholds globally To return to the default configuration use the no form of this command 4 422 QoS Commands 4 Syntax qos wrr queue threshold queue id threshold percentage no qos wrr queue threshold queue id qos wrr queue threshold gigabitethernet queue id threshold percentage no qos wrr queue threshold gigabitethernet queue id no qos wrr queue threshold tengigabitethernet queue id e gigabitethernet Indicates that the thresholds are to be applied to Gigabit Ethernet ports queue id Specifies the queue number to which the threshold is assigned e threshold percentageO 1 2 Specifies the queue threshold percentage value Each value is separated by a space Range 0 100 Default Setting 80 percent for all thresholds Command Mode Global Configuration mode Command Usage The packet refers to a certain threshold by the conformance level If threshold 0 is exceeded packets with the corresponding DP Drop Precedence are dropped until the threshold is no longer exceeded However packets assigned to threshold 1 or 2 continue to be queued and sent as long as the second or third threshold is not exceeded
515. ration Page Storm Control Page Port Mirroring Page Interface Statistics Page Etherlike Statistics Page AMAP Configuration Page AMAP Adjacencies Page Forwarding Database Static Addresses Page Dynamic Addresses Page STP General Page STP Interface Page Rapid Spanning Tree Page MSTP General Page MSTP Instance Settings Page MSTP Interface Page VLAN Basic Information Page VLAN Current Table Page VLAN Interface Configuration Page MAC Based VLAN Groups Page Subnet Based VLAN Groups Page Protocol Based VLAN Groups Page Mapping Groups to VLAN Page GARP Page GVRP Page GVRP Statistics Page Port Priority Page Priority Queue Page Bandwidth Configuration Page IP Precedence Page DSCP Priority Page Basic Mode General Page DSCP Rewrite Page DSCP Mapping Page Class Map Page 3 108 3 111 3 113 3 115 3 116 3 119 3 122 3 124 3 125 3 128 3 130 3 131 3 133 3 135 3 137 3 138 3 140 3 141 3 143 3 144 3 148 3 150 3 152 3 153 3 154 3 156 3 160 3 161 3 163 3 164 3 165 3 166 3 167 3 170 3 171 3 173 3 178 3 179 3 181 3 181 3 182 3 184 3 185 3 186 3 187 Figure 3 88 Figure 3 89 Figure 3 90 Figure 3 91 Figure 3 92 Figure 3 93 Figure 3 94 Figure 3 95 Figure 3 96 Figure 3 97 Figure 3 98 Figure 3 99 Figure 3 100 Figure 3 101 Figure 3 102 Figure 3 103 Figure 3 104 Figure 3 105 Figure 3 106 Figure 3 107 Aggregate Policer Page Tail Drop Page Policy Table Page IGMP
516. rd for authentication local Uses the local username database for authentication none Uses no authentication radius Uses the list of all RADIUS servers for authentication tacacs Uses the list of all TACACS servers for authentication Default Setting The local user database is checked This has the same effect as the command aaa authentication login ist name local Note On the console login succeeds without any authentication check if the authentication method is not defined Command Mode Global Configuration mode Command Usage The default and optional list names created with the aaa authentication login command are used with the login authentication command Create a list by entering the aaa authentication login ist name method command for a particular protocol where ist name is any character string used to name this list The method argument identifies the list of methods that the authentication algorithm tries in the given sequence The additional methods of authentication are used only if the previous method returns an error not if it fails To ensure that the authentication succeeds even if all methods return an error specify none as the final method in the command line Example The following example configures the authentication login Console config aaa authentication login default radius local enable none Related Commands aaa authentication enable login authentication
517. ree spanning tree cost The spanning tree cost Interface Configuration mode command configures the spanning tree path cost for a port To return to the default configuration use the no form of this command Syntax spanning tree cost cost no spanning tree cost e cost Path cost of the port Range 1 200 000 000 4 477 4 Command Line Interface Default Setting Default path cost is determined by port speed and path cost method long or short as shown below Interface Long Short Port channel 20 000 4 Gigabit Ethernet 1000 Mbps 20 000 4 Fast Ethernet 100 Mbps 200 000 19 Ethernet 10 Mbps 2 000 000 100 Command Modes Interface Configuration Ethernet port channel mode Command Usage The path cost method is configured using the spanning tree pathcost method Global Configuration mode command Example The following example configures the spanning tree cost on Ethernet port 1 e15 to 35000 console config interface ethernet 1 e15 console config if spanning tree cost 35000 Related Commands spanning tree forward time spanning tree hello time spanning tree max age spanning tree priority spanning tree disable spanning tree port priority spanning tree portfast spanning tree link type show spanning tree spanning tree port priority The spanning tree port priority Interface Configuration mode command configures port priority To return to the default configuration use the
518. return false unexpected return 3 Error Error conditions e g invalid input default used 2 Critical Critical conditions e g memory allocation or free memory error resource exhausted 1 Alert Immediate action needed 0 Emergency System unusable Enabling System Logs The Log Settings Page contains fields for defining which events are recorded to which logs It contains fields for enabling logs globally and parameters for defining logs The Severity log messages are listed from the highest severity to the lowest When a severity level is selected all severity level choices above the selection are selected automatically Command Attributes Enable Logging Indicates if device global logs for Cache File and Server Logs are enabled Console logs are enabled by default The possible field values are e Enabled Enables device logs e Disabled Disables device logs Severity The following are the available severity logs e Emergency Indicates the highest warning level If the device is down or not functioning properly an emergency log message is saved to the specified logging location e Alert Indicates the second highest warning level An alert log is saved if there is a serious device malfunction for example all device features are down 3 57 B Configuring the Switch Critical Indicates the third highest warning level A critical log is saved if a critical device malfunction
519. rface Configuration mode command enables unauthorized users on the interface access to the Guest VLAN To disable access use the no form of this command Syntax dot1x guest vian enable no dot1x guest vilan enable Default Setting Disabled Command Mode Interface Configuration Ethernet mode Command Usage A device can have only one global guest VLAN The guest VLAN is defined using the dot1x guest vlan Interface Configuration mode command Example The following example enables unauthorized users on Ethernet port 1 e1 to access the guest VLAN Console configure Console config interface ethernet 1 el1 Console config if dotlx guest vlan enable Related Commands dot1x guest vlan show dot1x advanced show dot1x advanced The show dot1x advanced Privileged EXEC mode command displays 802 1X advanced features for the device or specified interface Syntax show dot1x advanced ethernet interface e interface Valid Ethernet port Full syntax unit port Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command 4 253 4 Command Line Interface Example The following example displays 802 1X advanced features for the device Guest VLAN 2 Unauthenticated VLANs Interface Console show dot1x Interface Trap Enabled Trap frequency 100 Status Violations since last Console sho
520. ric terminal control functions to operating system specific functions To enter a Telnet sequence press the escape sequence keys Ctrl shift 6 followed by a Telnet command character Special Telnet Sequences Telnet Sequence Purpose Ctrl shift 6 b Break Ctrl shift 6 c Interrupt Process IP Ctrl shift 6 h Erase Character EC Ctrl shift 6 0 Abort Output AO Ctrl shift 6 t Are You There AYT Ctrl shift 6 u Erase Line EL At any time during an active Telnet session Telnet commands can be listed by pressing the Ctrl shift 6 keys at the system prompt 4 538 System Management Commands 4 A sample of this list follows Note that the Ctrl shift 6 sequence appears as on the screen console gt Ctrl shift 6 Special telnet escape help B sends telnet sends telnet sends telnet sends telnet sends telnet U sends telnet C H AA o T Ctrl shift 6 x suspends the session return to system command prompt BREAK IP EC AO AYT EL Several concurrent Telnet sessions can be opened and switched To open a subsequent session the current connection has to be suspended by pressing the escape sequence keys Ctrl shift 6 and x to return to the system command prompt Then open a new connection with the telnet User EXEC mode command Keywords Table Options Description lecho Enables local echo quiet Prevents onscreen display of all messages from the s
521. rinters Untagged VLANs Untagged or static VLANs are typically used to reduce broadcast traffic and to increase security A group of network users assigned to a VLAN form a broadcast domain that is separate from other VLANs configured on the switch Packets are forwarded only between ports that are designated for the same VLAN Untagged VLANs can be used to manually isolate user groups or subnets However you should use IEEE 802 3 tagged VLANs with GVRP whenever possible to fully automate VLAN registration Automatic VLAN Registration GVRP GARP VLAN Registration Protocol defines a system whereby the switch can automatically learn the VLANs to which each end station should be assigned If an end station or its network adapter supports the IEEE VLAN protocol it can be configured to broadcast a message to your network indicating the VLAN groups it wants to join When this switch receives these messages it will automatically place the receiving port in the specified VLANs and then forward the message to all other ports When the message arrives at another switch that supports GVRP it will also place the receiving port in the specified VLANs and pass the message on to all other ports VLAN requirements are propagated in this way throughout the network This allows GVRP compliant devices to be automatically configured for VLAN groups based solely on endstation requests To implement GVRP in a network first add the host devices to the requ
522. rity The lacp port priority Interface Configuration Ethernet mode command configures physical port priority To return to the default configuration use the no form of this command Syntax lacp port priority va ue no lacp port priority e value Specifies port priority Range 1 65535 Default Setting The default port priority is 1 Command Mode Interface Configuration Ethernet mode Command Usage There are no user guidelines for this command Example The following example defines the priority of Ethernet port 1 e6 as 247 Console config interface ethernet 1 e6 Console config if lacp port priority 247 Related Commands lacp timeout show lacp ethernet show lacp port channel 4 372 LACP Commands 4 lacp timeout The lacp timeout Interface Configuration Ethernet mode command assigns an administrative LACP timeout To return to the default configuration use the no form of this command Syntax lacp timeout long short no lacp timeout e long Specifies the long timeout value short Specifies the short timeout value Default Setting The default port timeout value is long Command Mode Interface Configuration Ethernet mode Command Usage There are no user guidelines for this command Example The following example assigns a long administrative LACP timeout to Ethernet port 1 e6 Console config interface ethernet 1 e6 Console config if lacp timeout long
523. rity addresses The show ports security addresses Privileged EXEC mode command displays the current dynamic addresses in locked ports Syntax show ports security addresses ethernet interface port channel port channel number e interface A valid Ethernet port e port channel number A valid port channel number Default Setting This command has no default configuration Command Mode Privileged EXEC Mode Command Usage There are no user guidelines for this command Example The following example displays the dynamic addresses in currently locked ports Console show ports security addresses Port Status Learning Current Maximum 1 el Disabled Lock 1 e2 Disabled Lock 1 e3 Enabled Max addresses 0 1 e4 Port is a member in port channel chl 1 e5 Disabled Lock 1 e6 Enabled Max addresses 0 0 chi Enabled Max addresses 0 50 ch2 Enabled Max addresses 0 28 4 294 AMAP Configuration 4 The following example displays the dynamic addresses in currently locked port 1 e1 Console show ports security addresses ethernet 1 el Port Status Learning Current Maximum 1 el Disabled Lock Bi AMAP Configuration The AMAP protocol discovers adjacent switches by sending and receiving AMAP Hello packets on active Spanning Tree ports Each port can be defined as being in one of three logical states of processing the AMAP Hello packets e Discovery The initial state where a port transmits a Hello
524. rking in 100M or 1000M mode Example The following example displays the estimated copper cable length attached to all ports Console gt show copper ports cable length Port Length meters 4 391 4 Command Line Interface 1 el lt 50 1 e2 Copper not active 1 e3 110 140 1 g1 Fiber Related Commands test copper port tdr show copper ports tdr show fiber ports optical transceiver The show fiber ports optical transceiver Privileged EXEC command displays the optical transceiver diagnostics Syntax show fiber ports optical transceiver interface detailed interface A valid Ethernet port Full syntax unit port e detailed Detailed diagnostics Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage To test optical transceivers ensure a fiber link is present Examples The following examples display the optical transceiver diagnostics Console show fiber ports optical transceiver Power Port Temp Voltage Current Output Input TX Fault LOS 1 g1 W OK E OK OK OK OK 1 g2 OK OK OK OK OK E OK 1 93 Copper 4 392 Port Channel Commands 4 Temp Internally measured transceiver temperature Voltage Internally measured supply voltage Current Measured TX bias current Output Power Measured TX output power Input Power Measured RX received power Tx Fault Transmitter fault LOS Loss of signal N A Not Avail
525. rmation Page CLI The following is an example of the VLAN Basic Information CLI commands Console show vlan 4 580 VLAN Name Ports Type Authorization 1 default 1 el e2 2 el e4 other Required 10 VLANO010 1 e3 e4 dynamic Required 1 VLANOO1 1 el e2 static Required 20 VLAN0020 1 e3 e4 static Required 2 VLANO02 static Required 30 VLAN0030 static Required 3 VLAN003 static Required 9 VLANOO1 1 el e2 static Not Required 3978 Guest VLAN 1 el7 guest Defining VLAN Membership Use the VLAN Static List to create or remove VLAN groups To propagate information about VLAN groups used on this switch to external network devices you 3 160 Configuring VLANs 3 must specify a VLAN ID for each of these groups The VLAN Current Table Page contains parameters for defining VLAN groups Command Attributes VLAN ID Displays the user defined VLAN ID VLAN Name Displays the name of the VLAN VLAN Type Indicates the VLAN type The possible field values are e Dynamic The VLAN was dynamically created through GARP e Static The VLAN is user defined Default The VLAN is the default VLAN Port Indicates the port membership LAG Indicates the LAG membership Untagged Orange Indicates the interface is an untagged VLAN member Packets forwarded by the interface are untagged Tagged Blue Indicates the interface is a tagged member of a VLAN All packets forwarded by the in
526. rmation to be captured across the entire network VLAN Groups Provides VLAN classification by MAC address subnet and protocol groups Multicast TV Supplies multicast transmissions to L2 isolated subscribers without replicating the multicast transmissions for each subscriber VLAN 1 6 System Defaults 1 Port Based Authentication Port based authentication enables authenticating system users on a per port basis via an external server Only authenticated and approved system users can transmit and receive data Ports are authenticated via the Remote Authentication Dial In User Service RADIUS server using the Extensible Authentication Protocol EAP System Defaults The device is configured with default settings To reset the device to the default settings delete the startup configuration The following table lists some of the basic system defaults Table 1 2 System Defaults Function Parameter Default Console Port Baud Rate 9600 Connection DE EE 3 Stop bits 1 Parity 0 Local Console Timeout 10 Authentication Privileged Exec Level no password Normal Exec Level no password Enable Privileged E xec from Normal no password Exec Level RADIUS Authentication disabled TACACS Authentication disabled 802 1x P ort Authentication disabled HTTPS disabled SSH disabled Port Security disabled SNMP Community Strings no SNMP communities Traps disabled SNMP V
527. rotocol Maps a protocol to a group of protocols Use the no form of this VLAN 4 592 protocols group command to delete the map switchport general Sets a protocol based classification rule To delete a IC 4 593 map classification use the no form of the command protocols group vlan show vlan Display protocols groups information PE 4 594 protocols group vlan database The vlan database Global Configuration mode command enters the VLAN Configuration mode Syntax vlan database Default Setting This command has no default configuration Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example enters the VLAN database mode console config vlan database console config vlan Related Commands vlan 4 566 VLAN Commands 4 name show vlan vian Use the vlan VLAN Configuration mode command to create a VLAN To delete a VLAN use the no form of this command Syntax vlan vian range no vian vian range vian range Specifies a list of VLAN IDs to be added Separate nonconsecutive VLAN IDs with a comma and no spaces a hyphen designates a range of IDs Default Setting This command has no default configuration Command Mode VLAN Configuration mode Command Usage There are no user guidelines for this command Example The following example VLAN number 1972 is created console config vlan database co
528. roup Read View Write View Security vl noAuthNoPriv DefaultROGroup defaultview none Community string only vl noAuthNoPriv DefaultRWGroup defaultview defaultview Community string only vl noAuthNoPriv user defined user defined user defined Community string only v2c noAuthNoPriv DefaultROGroup defaultview none Community string only v2c noAuthNoPriv DefaultRWGroup defaultview defaultview Community string only v2c noAuthNoPriv user defined user defined user defined Community string only v3 noAuthNoPriv user defined user defined user defined A user name match only v3 AuthNoP riv user defined user defined user defined Provides user authentication via MD5 or SHA algorithms v3 AuthP riv user defined user defined user defined Provides user authentication via MD5 or SHA algorithms and data privacy using DES 56 bit encryption The predefined default groups and view can be deleted from the system Enabling SNMP The SNMP Security Global Parameters Page permits the enabling of both SNMP and Authentication notifications An SNMPV3 engine is an independent SNMP agent that resides on the switch This engine protects against message replay delay and redirection The engine ID is also used in combination with user passwords to generate the security keys for authenticating and encrypting SNMPv3 packets A local engine ID is automatically generated that is unique to the switch
529. roups as well as defining the user authentication method Each SNMPv3 user is defined by a unique name Users must be configured with a specific security level and assigned to a group Command Attributes User Name Contains a list of user defined user names The field range is up to 30 alphanumeric characters Group Name Contains a list of user defined SNMP groups SNMP groups are defined in the SNMP Group Profile Page Engine ID Displays either the local or remote SNMP entity to which the user is connected Changing or removing the local SNMP Engine ID deletes the SNMPv3 user database e Local Indicates that the user is connected to a local SNMP entity 3 81 3 Configuring the Switch e Remote Indicates that the user is connected to a remote SNMP entity If the Engine ID is defined remote devices receive inform messages Authentication Displays the method used to authenticate users The possible field values are MD5 Key Users are authenticated using the HMAC MD5 algorithm e SHA Key Users are authenticated using the HMAC SHA 96 authentication level e MD5 Password The HMAC MD5 96 password is used for authentication The user should enter a password e SHA Password Users are authenticated using the HMAC SHA 96 authentication level The user should enter a password e No Authentication No user authentication is used e Remove Removes users from a specified group The poss
530. rriding the FDB decision is disabled Command Mode Interface Configuration Ethernet port channel Command Usage Packets to the MAC address of the device are sent to the device and not forwarded to the uplink A single uplink can be defined and can only be GE A port cannot have IP Interface configured on it and cannot be a member of a VLAN trunk that has IP interface configured on it For example console config console config interface ethernet 1 gl console config if switchport protected ethernet gl 4 578 VLAN Commands 4 Example The following example overrides the FDB decision and sends all Unicast Multicast and Broadcast traffic to Ethernet port 1 g1 console config console config interface ethernet 1 gl console config if switchport protected Related Commands ip internal usage vian The ip internal usage vlan Interface Configuration mode command reserves a VLAN as the internal usage VLAN of an interface To return to the default configuration use the no form of this command Syntax ip internal usage vlan vian id no ip internal usage vlan vian id Specifies the ID of the internal usage VLAN Default Setting The software reserves a VLAN as the internal usage VLAN of an interface Command Mode Interface Configuration Ethernet port channel mode Command Usage e An internal usage VLAN is required when an IP interface is configured on an Ethernet port or port channel T
531. rt on the designated bridge that connects the link or the shared LAN to the root e Designated Cost Indicates that the default path cost is assigned according to the method selected on the Spanning Tree Global Settings page e Forward Transitions Indicates the number of times the LAG State has changed from a Forwarding state to a Blocking state Remain Hops Indicates the hops remaining to the next destination Web Click Spanning Tree STA MSTP Interface Settings Define the fields and Click Apply Interface Settings ete Toate tentance ID E intestace GPa cuc E Port State WA Type wa Role wA Mode wa Mstestace Prbsalty 0289m stepa of Mp 128 Path Cosa 1209 000 800 ica D Use Dota Designated Bridge ID WA Designated Post ID WA Designated Cost WA Forwand Tiami sas HWA Remain Hopa wa Figure 3 68 MSTP Interface Page 3 156 Configuring VLANs 3 CLI The following is an example of the MSTP Interface Settings commands Console config spanning tree mst 1 priority 4096 Console config interface ethernet g1 Console config if spanning tree mst 1 port priority 142 Console config if spanning tree mst 1 cost 4 Configuring VLANs In large networks routers are used to isolate broadcast traffic for each subnet into separate domains This switch provides a similar service at Layer 2 by using VLANs to organize any group of network nodes into separate broadcast domains VLANs confine bro
532. s Console config if bridge multicast address 0100 5e02 02034 279 add ethernet 1 el1 1 e12 console config if end4 561 console show bridge multicast address table 4 287 Vlan MAC Address Type Forts 1 0100 5e02 0203 static 1 e11 1 e12 19 0100 5e02 0208 static 1 e11 16 19 0100 5e02 0208 dynamic 1 e11 12 Forbidden ports for multicast addresses Vlan MAC Address Ports 3 197 B Configuring the Switch 1 0100 5e02 0203 1 e8 19 0100 5e02 0208 1 e8 Configuring Multicast TV Multicast TV allows subscribers to join the same Multicast stream even if the subscribers are not members of the same VLAN eliminating television traffic duplication Ports which receive Multicast Transmissions or Receiver Ports can be defined in any VLAN and not just in the Multicast VLAN Receiver ports can only receive Multicast transmissions they cannot initiate a Multicast TV transmission Multicast TV source ports must be a Multicast VLAN members IGMP messages are used to indicate which ports are requesting to join or leave the Multicast group The GMP Snooping Mapping Page allows network managers to map IGMP snooping to VLANs Command Attributes e VLAN Defines the VLAN attached to the for which the IGMP Snooping mapping is defined e Multicast Group Defines the Multicast group IP addressed mapped to the VLAN e Remove Removes Multicast TV IGMP mappings The possible field values are e Checked Removes the
533. s All ports within a LAG must be the same media type A VLAN is not configured on the port 3 128 Creating Trunks 3 e The port is not assigned to a different LAG e Auto negotiation mode is not configured on the port e The port is in full duplex mode All ports in the LAG have the same ingress filtering and tagged modes All ports in the LAG have the same back pressure and flow control modes All ports in the LAG have the same priority All ports in the LAG have the same transceiver type e The device supports up to eight LAGs and eight ports in each LAG e Ports can be configured as LACP ports only if the ports are not part of a previously configured LAG e Ports added to a LAG lose their individual port configuration When ports are removed from the LAG the original port configuration is applied to the ports The device uses a hash function to determine which packets are carried on which aggregated link member The hash function statistically load balances the aggregated link members The device considers an Aggregated Link a single logical port Note To avoid creating a loop in the network be sure you add a static trunk via the configuration interface before connecting the ports and also disconnect the ports before removing a static trunk via the configuration interface The Interface Trunk Membership Page contains parameters for defining LAG and LACP ports Command Attributes e LAG Port Displays th
534. s Do not include the initial period that separates an unqualified name from the domain name Range 1 158 characters Default Setting A default domain name is not defined Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example defines default domain name www Alcatel com Console config ip domain name www Alcatel com Related Commands ip domain lookup ip name server ip host show hosts ip name server The ip name server Global Configuration mode command defines the available name servers To remove a name server use the no form of this command Syntax ip name server server address server address2 server address8 no ip name server server address1 server address8 e server address Specifies IP addresses of the name server Default Setting No name server addresses are specified Command Mode Global Configuration mode Command Usage The preference of the servers is determined by the order in which they were entered Up to 8 servers can be defined using one command or using multiple commands 4 367 4 Command Line Interface Example The following example sets the available name server Console config ip name server 176 16 1 18 Related Commands ip domain lookup ip domain name ip host show hosts ip host The ip host Global Configuration mode command defines static host name to
535. s clear counters The clear counters User EXEC mode command clears statistics on an interface Syntax clear counters ethernet interface port channel port channel number e interface Valid Ethernet port Full syntax unit port e port channel number Valid port channel number Default Setting This command has no default configuration Command Mode User EXEC mode Command Usage There are no user guidelines for this command 4 331 4 Command Line Interface Example In the following example the counters for interface 1 e1 are cleared Console gt clear counters ethernet 1 el1 Related Commands show interfaces counters set interface active The set interface active Privileged EXEC mode command reactivates an interface that was shutdown Syntax set interface active ethernet interface port channel port channel number e interface Valid Ethernet port Full syntax unit port port channel number Valid port channel number Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage This command is used to activate interfaces that were configured to be active but were shutdown by the system for some reason e g port security Example The following example reactivates interface 1 e5 Console set interface active ethernet 1 e5 Related Commands show interfaces status show interfaces advertise The show interfaces advertise
536. s Privileged EXEC mode command displays access lists applied on interfaces show interfaces access lists show interfaces access lists ethernet interface port channel port channel number e interface Valid Ethernet port Full syntax unit port e port channel number Valid port channel number Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command 4 275 4 Command Line Interface Example The following example displays ACLs applied to the interfaces of a device Console show interfaces access lists Interface Input ACL 1 el ACL1 2 el ACL3 Related Commands service acl Address Table Commands Table 4 8 Address Table Commands Command Function Mode Page bridge address Adds a MAC layer station source address to the bridge table To ICV 4 277 delete the MAC address use the no form of this command bridge multicas Enables filtering multicast addresses To disable filtering multicast GC 4 278 filtering addresses use the no form of this command bridge multicas Registers a MAC layer multicast address in the bridge table and ICV 4 279 address statically adds ports to the group To unregister the MAC address use the no form of this command bridge multicas Forbids adding a specific multicast address to specific ports Use ICV 4 280 forbidden a
537. s a port with a port channel To remove a port from a port channel use the no form of this command Syntax channel group port channel number mode on auto no channel group e port channel_number Specifies the ID of the valid port channel for the current port to join on Forces the port to join a channel without an LACP operation auto Allows the port to join a channel as a result of an LACP operation Default Setting The port is not assigned to a port channel Command Mode Interface Configuration Ethernet mode Command Usage There are no user guidelines for this command Example The following example forces port 1 e1 to join port channel 1 without an LACP operation Console config interface ethernet 1 e1 Console config if channel group 1 mode on Related Commands show interfaces port channel lacp system priority lacp port priority lacp timeout show lacp ethernet 4 395 4 Command Line Interface show interfaces port channel The show interfaces port channel Privileged EXEC mode command displays port channel information Syntax show interfaces port channel port channel number port channel number Valid port channel number Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays information on all port channels Co
538. s attached to the LAN e Alternate Provides an alternate path to the root switch from the root interface e Backup Provides a backup path to the designated port path toward the Spanning Tree leaves Backup ports occur only when two ports are connected in a loop by a point to point link or when a LAN has two or more connections connected to a shared segment e Disabled The port is not participating in the Spanning Tree Mode Displays the current STP mode The STP mode is selected in the STP Properties Page The possible field values are e STP Classic STP is enabled on the device e Rapid STP Rapid STP is enabled on the device Multiple STP Multiple STP is enabled on the device Fast Link Operational Status Indicates whether Fast Link is enabled or disabled for the port or LAG If Fast Link is enabled for a port the port is automatically placed in the forwarding state Port Status Displays the RSTP status for the port on which RSTP is enabled The possible field values are Disable indicates the port is currently disabled Forwarding Indicates the port is currently linked and forwarding traffic Point to Point Admin Status Indicates whether a point to point link is established or if the device is permitted to establish a point to point link The possible field values are Enable The device is permitted to establish a point to point link or is configured to automatically establish a poin
539. s command Example The following example displays the switchport configuration for Ethernet port 1 e1 console show interface switchport ethernet 1 el Port l el VLAN Membership mode General Operating parameters PVID 1 default Ingress Filtering Enabled Acceptable Frame Type All GVRP status Enabled Protected Enabled Uplink is 1 e9 Port 1 el is member in vlan Name Egress rule Type 1 default untagged System 8 VLAN008 tagged Dynamic 11 VLANO11 tagged Static 19 IPv6 VLAN untagged Static 72 VLANO072 untagged Static Static configuration PVID 1 default Ingress Filtering Enabled Acceptable Frame Type All Port 1 el is statically configured to vlan Name Egress rule i default untagged 4 582 VLAN Commands 4 11 VLANO11 tagged 19 IPv VLAN untagged 72 VLANO072 untagged Forbidden VLANS VLAN Name 73 out console show interface switchport ethernet 1 e2 Port 1 e2 VLAN Membership mode General Operating parameters PVID 4095 discard vlan Ingress Filtering Enabled Acceptable Frame Type All Port 1 el is member in Vlan Name Egress rule Type 91 IP Telephony tagged Static Static configuration PVID 8 Ingress Filtering Disabled Acceptable Frame Type All Port 1 e2 is statically confgiured to Vlan Name Egress rule 8 VLAN0072 untagged 91 IP Telephony tagged 4 583 4 Command Line Interface Forbidden VLANS VLAN Name 73 out Port 2 e19
540. s command snmp server Specifies the recipient of Simple Network Management Protocol GC 4 461 v3 host Version 3 notifications To remove the specified host use the no form of this command snmp server trap Enables the device to send SNMP traps when authentication fails GC 4 462 authentication To disable SNMP failed authentication traps use the no form of this command snmp server Configures the system contact sysC ontact string To remove GC 4 462 contact system contact information use the no form of the command snmp server Configures the system location string To remove the location GC 4 463 location string use the no form of this command snmp server set Defines the SNMP MIB value GC 4 464 show snmp Displays the SNMP status PE 4 464 4 451 4 Command Line Interface Table 4 26 SNMP Commands Command Function Mode Page show snmp Displays the ID of the local Simple Network Management Protocol P E 4 466 engineid SNMP engine show snmp views Displays the configuration of views PE 4 467 show snmp groups Displays the configuration of groups PE 4 467 show snmp filters Displays the configuration of filters PE 4 468 show snmp users Displays the configuration of users PE 4 469 snmp server community The snmp server community Global Configuration mode command configures the community access string to permit access to the SNMP protocol To remove the specified comm
541. s currently blocked and cannot forward traffic or learn MAC addresses Blocking is displayed when Classic STP is enabled e Speed Indicates the speed at which the port is operating e Path Cost Indicates the port contribution to the root path cost The path cost is adjusted to a higher or lower value and is used to forward traffic when a path is re routed e Priority Priority value of the port The priority value influences the port choice when a bridge has two ports connected in a loop The priority value is between 0 240 The priority value is determined in increments of 16 e Designated Bridge ID Indicates the bridge priority and the MAC Address of the designated bridge Designated Port ID Indicates the selected port priority and interface e Designated Cost Indicates the cost of the port participating in the STP topology Ports with a lower cost are less likely to be blocked if STP detects loops e Forward Transitions Indicates the number of times the port has changed from Forwarding state to Blocking state e LAG Indicates the LAG to which the port belongs 3 149 B Configuring the Switch Web Click Spanning Tree STP Interface Configuration Interface Configuration Unit He Fast Root Pon Pat Designated designated Designated Forward f toetoe STP States tink Gand State SPOT cose Potty Blane Pon 0 Cont Tromalttons AG Modity Wet Disabled 1000M 14 Global System LAGS tant
542. s for authentication from any point within the network Port based authentication authenticates users on a per port basis via an external server Only authenticated and approved system users can transmit and receive data Ports are authenticated via the RADIUS server using the Extensible Authentication Protocol EAP Port based authentication includes Authenticators Specifies the device port which is authenticated before permitting system access Supplicants Specifies the host connected to the authenticated port requesting to access the system services e Authentication Server Specifies the server that performs the authentication on behalf of the authenticator and indicates whether the supplicant is authorized to access system services The RADIUS server verifies the client identity and sends an access challenge back to the client The EAP packet from the RADIUS server contains not only the challenge but the authentication method to be used The client can reject the authentication method and request another depending on the configuration of the client software and the RADIUS server The RADIUS server verifies the client credentials and responds with an accept or reject packet If authentication is successful the switch allows the client to access the network Otherwise network access is denied and the port remains blocked Port based authentication creates two access states Controlled Access Permits communicat
543. s globally To enable polling you should also use the sntp unicast client poll Global Configuration mode command for global enabling Polling time is determined by the sntp client poll timer Global Configuration mode command Example The following example configures the device to accept SNTP traffic from the server on 192 1 1 1 Console config sntp server 192 1 1 1 Related Commands sntp authentication key sntp trusted key show sntp configuration show snip status show clock The show clock User EXEC mode command displays the time and date from the system clock Syntax show clock detail e detail Shows timezone and summertime configuration Default Setting This command has no default configuration Command Mode User EXEC mode 4 311 4 Command Line Interface Command Usage The symbol that precedes the show clock display indicates the following Symbol Description Time is not authoritative blank Time is authoritative Time is authoritative but SNTP is not synchronized Example The following example displays the time and date from the system clock Console gt show clock 15 29 03 PDT UTC 7 Jun 17 2002 Time source is SNTP Console gt show clock detail 15 29 03 PDT UTC 7 Jun 17 2002 Time source is SNTP Time zone Acronym is PST Offset is UTC 8 Summertime Acronym is PDT Recurring every year Begins at first Sunday of April at 2 00 Ends at last Sunda
544. s modify the system level configuration and include commands such as hostname and snmp server community e Access Control List Configuration These commands are used for packet filtering e Interface Configuration These commands modify the port configuration such as speed duplex and negotiation e Line Configuration These commands modify the console port and Telnet configuration and include command such as parity and databits e VLAN Configuration Includes the command to create VLAN groups e Multiple Spanning Tree Configuration These commands configure settings for the selected multiple spanning tree instance To enter the Global Configuration mode enter the command configure in Privileged Exec mode The system prompt will change to Console config which gives you access privilege to all Global Configuration commands Console configure Console config To enter the other modes at the configuration prompt type one of the following commands Use the exit or end command to return to the Privileged Exec mode Table 4 2 Configuration Command Modes Mode Command Prompt Page Line line console ssh telnet Console config line page 4 377 Access access list ip standard Console config std acl 4 265 Control List access list ip extended Console config ext acl access list ip mask precedence Console config ip mask acl access list mac Console config mac
545. s the Class map GC 4 407 Configuration mode To delete a class map use the no form of this command show class map Displays all class maps UE 4 408 match Defines the match criteria for classifying traffic To delete the CMC 4 409 match criteria use the no form of this command policy map Creates a policy map and enters the Policy map Configuration GC 4 410 mode To delete a policy map use the no form of this command class Defines a traffic classification and enters the Policy map Class PMC 4 410 Configuration mode To remove a class map from the policy map use the no form of this command show policy map Displays the policy maps UE 4 411 trust cos dscp Configures the trust state The trust state determines the source PCC 4 412 of the internal DSCP value used by Quality of Service QoS To return to the default configuration use the no form of this command set Sets new values in the IP packet PCC 4 413 police Defines the policer for classified traffic To remove a policer use PCC 4 414 the no form of this command service policy Applies a policy map to the input of a particular interface To IC 4 415 detach a policy map from an interface use the no form of this command qos Defines the policer parameters that can be applied to multiple GC 4 416 aggregate policer traffic classes within the same policy map To remove an existing aggregate policer use the no form of this command show qos Displays the aggregate policer parameter UE
546. s to be created between a pair of LAN segments When there are multiple physical paths between segments this protocol will choose a single path and disable all others to ensure that only one route exists between any two stations on the network This prevents the creation of network loops However if the chosen path should fail for any reason an alternate path will be activated to maintain the connection Rapid Spanning Tree Protocol RSTP IEEE 802 1w This protocol reduces the convergence time for network topology changes to about 10 of that required by the older IEEE 802 1D STP standard It is intended as a complete replacement for STP but can still interoperate with switches running the older standard by automatically reconfiguring ports to STP compliant mode if they detect STP protocol messages from attached devices Multiple Spanning Tree Protocol MSTP IEEE 802 1s This protocol is a direct extension of RSTP It can provide an independent spanning tree for different VLANs It simplifies network management provides for even faster convergence than RSTP by limiting the size of each region and prevents VLAN members from being segmented from the rest of the group as sometimes occurs with IEEE 802 1D STP Virtual LANs The switch supports up to 255 VLANs A Virtual LAN is a collection of network nodes that share the same broadcast domain regardless of their physical location or connection point in the network The switch supports
547. s unauthorized users on the interface access to the Guest ICE 4 253 enable VLAN To disable access use the no form of this command show dotlx Displays 802 1X advanced features for the device or specified PE 4 253 advanced interface aaa authentication dot1x The aaa authentication dot1x Global Configuration mode command specifies one or more authentication authorization and accounting AAA methods for use on interfaces running IEEE 802 1X To return to the default configuration use the no form of this command Syntax aaa authentication dot1x default method method2 no aaa authentication dot1x default e method method2 At least one from the following table Keyword Description Radius Uses the list of all RADIUS servers for authentication None Uses no authentication Default Setting No authentication method is defined Command Mode Global Configuration 4 233 4 Command Line Interface Command Usage Additional methods of authentication are used only if the previous method returns an error and not if the request for authentication is denied To ensure that authentication succeeds even if all methods return an error specify none as the final method in the command line The RADIUS server must support MD 5 challenge and EAP type frames Example The following example uses the aaa authentication dot1x default command with no authentication Console config
548. sable GVRP on an interface use the no form of this command Syntax gvrp enable no gvrp enable Default Setting GVRP is disabled on all interfaces Command Mode Interface Configuration Ethernet port channel mode Command Usage An access port does not dynamically join a VLAN because it is always a member in only one VLAN Membership in an untagged VLAN is propagated in the same way as in a tagged VLAN That is the PVID is manually defined as the untagged VLAN VID Example The following example enables GVRP on Ethernet port 1 e6 Console config interface ethernet 1 e6 Console config if gvrp enable Related Commands gvrp enable Global garp timer gvrp vian creation forbid gvrp registration forbid show gvrp configuration garp timer The garp timer Interface Configuration Ethernet Port channel mode command adjusts the values of the join leave and leaveall timers of GARP applications To return to the default configuration use the no form of this command Syntax garp timer join leave leaveall timer_value 4 345 4 Command Line Interface no garp timer e join leave leaveall Indicates the type of timer e timer_value Timer values in milliseconds in multiples of 10 Range 10 2147483647 Default Setting Following are the default timer values e Join timer 200 milliseconds e Leave timer 600 milliseconds e Leavall timer 10000 milliseconds Command Mode
549. sages displayed to the user Example The following example limits syslog messages displayed from an internal buffer based on severity level debugging console config logging buffered debugging Related Commands logging clear logging show logging 4 524 Syslog Commands 4 logging buffered size The logging buffered size Global Configuration mode command changes the number of syslog messages stored in the internal buffer To return to the default configuration use the no form of this command Syntax logging buffered size number no logging buffered size e number Specifies the maximum number of messages stored in the history table Range 20 400 Default Setting The default number of messages is 200 Command Mode Global Configuration mode Command Usage This command takes effect only after Reset Example The following example changes the number of syslog messages stored in the internal buffer to 300 console config logging buffered size 300 Related Commands show logging clear logging The clear logging Privileged EXEC mode command clears messages from the internal logging buffer Syntax clear logging Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command 4 525 4 Command Line Interface Example The following example clears messages from the internal logging buffer
550. second format such as 2 days 5 hours 10 minutes and 4 seconds The current root port and current root cost display as zero when this device is not connected to the network Web Click Spanning Tree STP 3 147 B Configuring the Switch Spanning Troe State Erani 3 STP Operation Mode Rapa STP E BPDU Hamttieg Frees oy Path Cost Detant Values Shon E Bilge Somaya Priority C Meie Time F I cee C Max Age Pee CfewadDelay 5 See Designated Root Beldge 10 Rest Bibige ID Rest Port Rest Path Cont Topology Changes Comm Last Topology Change Figure 3 63 STP General Page CLI This command displays global STA settings followed by settings for each port Console config spanning tree 4 472 console config spanning tree mode rstp 4 472 Console config spanning tree bpdu flooding 4 482 Console config spanning tree pathcost method long 4 481 Console config interface ethernet 1 e15 4 323 Console config spanning tree priority 12288 4 476 Console config spanning tree hello time 5 4 474 Console config spanning tree max age 10 4 475 onsole config spanning tree forward time 25 4 473 Defining STP on Interfaces Network administrators can assign STP settings to specific interfaces using the STP Interface Page The Global LAGs section displays the STP information for Link Aggregated Groups Adhere to the following guidelines when configuring STP on an interface A port on a netw
551. server The field default is Local 7 The possible field values are Local 0 Local 7 e Description Displays the user defined server description e Minimum Severity Indicates the minimum severity from which logs are sent to the server For example if Notice is selected all logs with a severity level of Notice and higher are sent to the remote server e Remove Deletes the currently selected server from the Servers list The possible field values are Checked Removes the selected server from the Remote Log Parameters Page Once removed logs are no longer sent to the removed server e Unchecked Maintains the remote servers Web Click System Mgmt Logs System Logs Specify Remote Log Status Remote Logs Server VOP Port Facitiny Description Minimum Severity Remove vu r 38 ees Figure 3 20 Remote Log Page CLI Enable system logging and then specify the level of messages to be logged to remote logs Use the show logging command to display the current settings 3 63 B Configuring the Switch Console show logging file 4 531 Logging is enabled Console logging level debugging Console Messages 0 Dropped severity Buffer logging level debugging Buffer Messages 11 Logged 200 Max File logging level notifications File Messages 0 Dropped severity Syslog server 192 180 2 27 logging errors Messages 6 Dropped severity Syslog server 192 180 2 28 logging errors Messages 6 Droppe
552. setting use the no form of this command Syntax terminal history size number of commands terminal no history size number of commands Specifies the number of commands the system may record in its command history buffer Range 10 216 Default Setting The default history size for all terminal sessions is defined by the history size line configuration command Command Mode User EXEC mode Command Usage The terminal history size user EXEC command configures the size of the command history buffer for the current terminal session To change the default size of the command history buffer use the history line configuration command The maximum number of commands in all buffers is 256 Example The following example configures the command history buffer size to 20 commands for the current terminal session Console terminal history size 20 Related Commands show line show line The show line User EXEC mode command displays line parameters Syntax show line console telnet ssh console Console terminal line e telnet Virtual terminal for remote console access Telnet e ssh Virtual terminal for secured remote console access SSH Default Setting This command has no default configuration 4 382 Line Commands 4 Command Mode User EXEC mode Command Usage If line is not specified information for all lines is given Example The following example displays the line configuration
553. smitted from the selected interface Web Click Port Port Statistics or Etherlike Statistics Select the required interface and click Query Use the Refresh button at the bottom of the page to update the screen Statistics Interface Bae cre cus Refresh Rate No Retesh J Recebve Statiatica Total Bytes Octet Unicast Packets Multicast Packets Broadcast Packets Pockets wih Enron Trammi Statistics Total Dyves fOctors Unicast Packets Multicast Packers Broadcast Packets Figure 3 57 Interface Statistics Page 3 137 B Configuring the Switch Intortaca Croa H cus E Retrosh Rate F Roresn E Frame Choch Seqwemce FCS Errors Siagte Collision Frases o Late Colihdsas Excessive Collinioes Intormal MAC Tramemat Erroen Oversize Packets interwal MAC Recelve Errors Received Pause Frames Tiammined Paino Frames oo oo o loo Figure 3 58 Etherlike Statistics Page CLI The following is an example of the CLI commands displaying Interface statistics Console gt show rmon statistics ethernet 1 el 4 437 Port 1 ei Octets 878128 Packets 978 Broadcast 7 Multicast 1 CRC Align Errors 0 Collisions 0 Undersize Pkts 0 Oversize Pkts 0 Fragments 0 Jabbers 0 64 Octets 98 65 to 127 Octets 0 128 to 255 Octets 0 256 to 511 Octets 0 512 to 1023 Octets 491 1024 to 1518 Octets 389 CLI The following is an example of the CLI commands displaying Etherlike statistics show interface stat
554. sole session Passwords can contain a maximum of 159 characters Telnet Line Password Defines the line password for accessing the device via a Telnet session Passwords can contain a maximum of 159 characters e Secure Telnet Line Password Defines the line password for accessing the device via a secure Telnet session Passwords can contain a maximum of 159 characters 3 91 B Configuring the Switch Confirm Password Confirms the new line password The password appears in the format Web Click System Passwords Line define the fields and click Apply Comsete Line Password Telnet Ling Password Oranemre Secure Telnet Line Passwort Be Figure 3 35 Line Password Page CLI The following is an example of the CLI commands used for configuring Line Passwords Console config line console 4 377 Console config line password secret 4 262 Defining Enable Passwords The Enable Passwords Page sets a local password for a particular access level Command Attributes e Level Defines the access level associated with the enable password Possible field values are 1 15 e Password Defines the enable password e Confirm Password Confirms the new enable password The password appears in the format Web Click System Passwords Enable define the fields and click Apply 3 92 Defining Access Profiles 3 Select Enable Access Level 1 J Pawword Agha Numenc
555. spanning tree mst max hops spanning tree mst port priority spanning tree mst cost spanning tree mst configuration instance mst name mst revision mst exit mst abort mst show spanning tree exit mst The exit MST Configuration mode command exits the MST configuration mode and applies all configuration changes Syntax exit Default Setting This command has no default configuration Command Mode MST Configuration mode Command Usage There are no user guidelines for this command 4 492 Spanning Tree Commands 4 Example The following example exits the MST configuration mode and saves changes console config Spanning tree mst configuration console config mst exit Related Commands spanning tree mst priority spanning tree mst max hops spanning tree mst port priority spanning tree mst cost spanning tree mst configuration instance mst name mst revision mst show mst abort mst show spanning tree abort mst The abort MST Configuration mode command exits the MST configuration mode without applying the configuration changes Syntax abort Default Setting This command has no default configuration Command Mode MST Configuration mode Command Usage There are no user guidelines for this command Example The following example exits the MST configuration mode without saving changes console config spanning tree mst configuration console config mst abort
556. speed of a given E thernetinterface when notusing IC 4 326 auto negotiation To restore the default configuration use the no form of this command duplex Configures the full half duplex operation of a given Ethernet ICE 4 327 interface when not using auto negotiation To restore the default configuration use the no form of this command negotiation Enables auto negotiation operation for the speed and duplex IC 4 328 parameters of a given interface To disable auto negotiation use the no form of this command flowcontrol Configures flow control on a given interface To disable flow IC 4 329 control use the no form of this command mdix Enables cable crossover on a given interface To disable cable ICE 4 329 crossover use the no form of this command back pressure Enables back pressure on a given interface To disable back ICE 4 330 pressure use the no form of this command clear counters Clears statistics on an interface UE 4 331 set interface active Reactivates an interface that was shutdown PE 4 332 show interfaces Displays autonegotiation data PE 4 332 4 322 Ethernet Configuration Commands 4 Table 4 12 Ethernet Commands Command Function Mode Page show interfaces Displays the configuration for all configured interfaces PE 4 334 configuration show interfaces Displays the status of all configured interfaces PE 4 335 status show interfaces Displays the description for all configured interfac
557. splays entries in the ARP table Console show arp ARP timeout 80000 Seconds Interface IP address HW address Status 1 el 10 7 1 102 00 10 B5 04 DB 4B Dynamic 2 e2 10 75 1135 00 50 22 00 2A A4 Static 4 365 4 Command Line Interface Related Commands arp arp timeout ip domain lookup The ip domain lookup Global Configuration mode command enables the IP Domain Naming System DNS based host name to address translation To disable DNS based host name to address translation use the no form of this command Syntax ip domain lookup no ip domain lookup Default Setting IP Domain Naming System DNS based host name to address translation is enabled Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example enables IP Domain Naming System DNS based host name to address translation Console config ip domain lookup Related Commands ip domain name ip name server ip host show hosts ip domain name The ip domain name Global Configuration mode command defines a default domain name used by the software to complete unqualified host names names without a dotted decimal domain name To remove the default domain name use the no form of this command Syntax ip domain name name no ip domain name name Specifies the default domain name used to complete unqualified 4 366 IP Addressing Commands 4 host name
558. ss From a BOOTP Server The standard BOOTP protocol is supported and enables the switch to automatically download its IP host configuration from any standard BOOTP server in the network In this case the device acts as a BOOTP client To retrieve an IP address from a BOOTP server 1 Select and connect any port to a BOOTP server or subnet containing such a server to retrieve the IP address 2 Atthe system prompt enter the delete startup configuration command to delete the startup configuration from flash The device reboots with no configuration 2 21 20 Initial Configuration and in 60 seconds starts sending BOOTP requests The device receives the IP address automatically Note When the device reboot begins any input at the ASCII terminal or keyboard automatically cancels the BOOTP process before completion and the device does not receive an IP address from the BOOTP server The following example illustrates the process Console gt enable 4 318 Console delete startup config 4 272 Startup file was deleted Console reload 4 541 You haven t saved your changes Are you sure you want to continue y n n This command will reset the whole system and disconnect your current session Do you want to continue y n n KOK KKK KK KKK KKK KKK KKK KKK KKK KKK KKK KKK KK KKK KKK KKK KKK KKK EK the device reboots To verify the IP address enter the show ip interface command The device is now configured with
559. st Console config management access class mlist Related Commands management access list show management access class show management access list The show management access list Privileged EXEC mode command displays management access lists Syntax show management access list name name Specifies the name of a management access list Range 1 32 characters Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays the mlist management access list Console show management access list mlist mlist permit ethernet 1 e1 permit ethernet 2 e2 Note all other access implicitly denied Related Commands management access list permit Management 4 388 PHY Diagnostics Commands 4 deny Management show management access class The show management access class Privileged EXEC mode command displays the active management access list Syntax show management access class Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays information about the active management access list Console show management access class Management access class is enabled using access list mlist Related Comman
560. st instance 1 add vlan 10 20 4 488 Defining MSTP Interface Settings You can configure the STA interface settings for an MST Instance using the MSTP Interface Page Command Attributes e Instance ID Lists the MSTP instances configured on the device Possible field range is 0 15 Interface Displays the interface for which the MSTP settings are displayed The possible field values are e Port Specifies the port for which the MSTP settings are displayed e LAG Specifies the LAG for which the MSTP settings are displayed e MSTP Specifies whether or not MSTP is enable on the interface The possible field values are Enabled Enables MSTP on the interface Disabled Disables MSTP on the interface e Port State Indicates whether the port is enabled for the specific instance The possible field values are Enabled Enables the port for the specific instance Disabled Disables the port for the specific instance Type Indicates whether the port is a Boundary or Master port The possible field values are e Boundary Port Indicates that the port is a Boundary port A Boundary port attaches MST bridges to LANs in an outlying region If the port is a Boundary port this field also indicates whether the device on the other side of the link is working in RSTP or STP mode e Master Port Indicates the port is a master port A Master port provides connectivity from a MSTP region to the o
561. st to which the packet is being sent destination wildcard Optional for the first type Specifies wildcard bits by placing 1s in bit positions to be ignored e vian id Specifies the ID of the packet vlan e cos Specifies the packets s Class of Service CoS cos wildcard Specifies wildcard bits to be applied to the CoS e eth type Specifies the packet s Ethernet type Default Setting This command has no default configuration Command Mode MAC Access List Configuration mode Command Usage MAC BPDU packets cannot be denied This command defines an Access Control Element ACE An ACE can only be removed by deleting the ACL using the no mac access list Global Configuration mode command Alternatively the Web based interface can be used to delete ACEs from an ACL Use the following user guidelines e Before an Access Control Element ACE is added to an ACL all packets are permitted After an ACE is added an implied deny any any condition exists at the end of the list and those packets that do not match the conditions defined in the permit statement are denied e Ifthe VLAN ID is specified the policy map cannot be connected to the VLAN interface 4 273 4 Command Line Interface Example The following example shows how to create a MAC ACL with deny rules on a device Console config mac access list macli Console config mac acl deny 06 06 06 06 06 06 00 00 00 00 00 00 any Related
562. stablish a separate connection with each client It merely broadcasts its service to the network and any hosts that want to receive the multicast register with their local multicast switch router Although this approach reduces the network overhead required by a multicast server the broadcast traffic must be carefully pruned at every multicast switch router it passes through to ensure that traffic is only passed on to the hosts which subscribed to this service This switch uses IGMP Internet Group Management Protocol to query for any attached hosts that want to receive a specific multicast service It identifies the ports containing hosts requesting to join the service and sends data out to those ports only It then propagates the service request up to any neighboring multicast switch router to ensure that it will continue to receive the multicast service This procedure is called multicast filtering The purpose of IP multicast filtering is to optimize a switched network s performance so multicast packets will only be forwarded to those ports containing multicast group hosts or multicast routers switches instead of flooding traffic to all ports in the subnet VLAN The IGMP Configuration Page contains parameters for configuring switches to forward multicast traffic Command Attributes Enable IGMP Snooping Status When enabled the switch will monitor network traffic to determine which hosts want to receive multicast traffic Th
563. stanford edu Host name of this device 192 68 191 83 IP address of this device 1 msec 1 msec 1 msec Round trip time for each probe sent The following table describes characters that may appear in the traceroute command output Field Description The probe timed out Unknown packet type A Administratively unreachable Usually this output indicates that an access listis blocking traffic F Fragmentation is required and DF is set H Host unreachable N Network unreachable P Protocol unreachable Q Source quench R Fragment reassembly time exceeded S Source route failed U Port unreachable Related Commands ping 4 537 4 Command Line Interface telnet The telnet User EXEC mode command enables logging on to a host that supports Telnet Syntax telnet jp address hostname port keyword7 jp address IP address of the destination host hostname Host name of the destination host Range 1 158 characters port A decimal TCP port number or one of the keywords listed in the Ports table in the Command Usage e keyword One or more keywords listed in the Keywords table in the Command Usage Default Setting The default port is the Telnet port decimal23 on the host Command Mode User EXEC mode Command Usage Telnet software supports special Telnet commands in the form of Telnet sequences that map gene
564. t Displays the port number for which advanced port based authentication is enabled Multiple Hosts Indicates whether multiple hosts are enabled Multiple hosts must be enabled in order to either disable the ingress filter or to use port lock security on the selected port The possible field values are e Multiple Multiple hosts are enabled e Single Multiple hosts are disabled This is the default value e Action on Violation Defines the action to be applied to packets arriving in single host mode from a host whose MAC address is not the supplicant MAC address The possible field values are e Forward Forwards the packet e Discard Discards the packets This is the default value e Shutdown Discards the packets and shuts down the port The ports remains shut down until reactivated or until the device is reset e Traps Indicates if traps are enabled for Multiple Hosts The possible field values are e True Indicates that traps are enabled for Multiple hosts e False Indicates that traps are disabled for Multiple hosts Trap Frequency Defines the time period by which traps are sent to the host The Trap Frequency 1 1000000 field can be defined only if multiple hosts are disabled The default is 10 seconds e Status Indicates the host status If there is an asterisk the port is either not linked or is down The possible field values are e Unauthorized Indicates that eit
565. t 1l el Octets 878128 Packets 978 Broadcast 7 Multicast 1 CRC Align Errors 0 Collisions 0 Undersize Pkts 0 Oversize Pkts 0 Fragments 0 Jabbers 0 3 212 Managing RMON Statistics 3 64 Octets 98 65 to 127 Octets 0 128 to 255 Octets 0 256 to 511 Octets 0 512 to 1023 Octets 491 1024 to 1518 Octets 389 3 213 B Configuring the Switch Defining RMON History Control The RMON History Control Page contains information about samples of data taken from ports For example the samples may include interface definitions or polling periods Command Attributes History Entry No Displays the entry number for the History Control Table page Source Interface Displays the interface from which the history samples were taken The possible field values are e Port Specifies the port from which the RMON information was taken e LAG Specifies the port from which the RMON information was taken Sampling Interval Indicates in seconds the time that samplings are taken from the ports The field range is 1 3600 The default is 1800 seconds equal to 30 minutes Samples Requested Displays the number of samples to be saved The field range is 1 65535 The default value is 50 Current No of Samples in List Displays the current number of samples taken Owner Displays the RMON station or user that requested the RMON information The field range is 0 20 characters Remove Removes History C
566. t configuration file to a network server using TFTP Use the copy startup config destination url command to copy the startup configuration file to a network server Saving the Running Configuration to the Startup Configuration To copy the running configuration to the startup configuration file enter the copy running config startup config command Backing up the Running or Startup Configuration to a Backup Configuration File To copy the running configuration file to a backup configuration file enter the copy running config file command To copy the startup configuration file to a backup configuration file enter the copy startup config file command 4 317 4 Command Line Interface Before copying from the backup configuration file to the running configuration file make sure that the backup configuration file has not been corrupted Example The following example copies system image file1 from the TFTP server 172 16 101 101 to a non active image file Console copy tftp 172 16 101 101 file1 image Accessing file filel on 172 16 101 101 Loading filel from 172 16 101 101 ETEUETLECRTT ESTER IEEE TPT ETRE EET TEI Tae Plrtrret OK Copy took 0 01 11 hh mm ss Related Commands delete show running config show startup config delete The delete Privileged EXEC mode command deletes a file from a flash memory device Syntax delete url e url The location URL or reserved keyword of the file to be deleted
567. t 4 457 Defining SNMP Views SNMP views provide or block access to device features or portions of features For example a view can be defined which provides that SNMP group A has Read Only R O access to Multicast groups while SNMP group B has Read Write R W access to Multicast groups Feature access is granted via the MIB name or MIB Object ID The SNMP Views Page contains fields for assigning parameters that provide or block access to device features Command Attributes e View Name Displays the user defined views The view name can contain a maximum of 30 alphanumeric characters Object ID Subtree Displays the device feature OID included in or excluded from the selected SNMP view e View Type Indicates whether the defined OID branch will be included in or excluded from the selected SNMP view e Remove Deletes the currently selected view The possible field values are 3 78 Configuring SNMP 3 e Checked Removes the selected view e Unchecked Maintains the list of views Web Click SNMP SNMPv3 Views Click New to configure a new view In the New View page define a name and specify OID subtrees in the switch MIB to be included or excluded in the view Click Back to save the new view and return to the SNMPv3 Views list For a specific view click on View OID Subtrees to display the current configuration or click on Edit OID Subtrees to make changes to the view settings To delete a view chec
568. t Global Configuration mode command configures multiple Ethernet type interfaces at the same time Syntax interface range ethernet port range all port range List of valid ports Where more than one port is listed separate nonconsecutive ports with a comma and no spaces use a hyphen to designate a range of ports and group a list seperated by commas in brackets e all All Ethernet ports Default Setting This command has no default configuration Command Mode Global Configuration mode Command Usage Commands under the interface range context are executed independently on each active interface in the range If the command returns an error on one of the active interfaces it does not stop executing commands on other active interfaces Example The following example shows how ports 5 e18 to 5 e20 and 3 e1 to 3 24 are grouped to receive the same command Console config interface range ethernet 5 e18 5 e20 3 el 3 e24 Console config if Related Commands interface range ethernet show interfaces configuration show interfaces status shutdown The shutdown Interface Configuration Ethernet port channel mode command disables an interface To restart a disabled interface use the no form of this command Syntax shutdown no shutdown 4 324 Ethernet Configuration Commands 4 Default Setting The interface is enabled Command Mode Interface Configuration Ethernet port channel mode Co
569. t configuration use the no form of this command authentication return to the default configuration use the no form of this command show authentication Displays information about the authentication methods PE 4 261 methods password Specifies a password on a line To remove the password use the LC 4 262 no form of this command enable password Sets a local password to control access to user and privilege GC 4 263 levels To remove the password requirement use the no form of this command t username Creates a user account in the local database To remove a user GC 4 264 name use the no form of this command aaa authentication login The aaa authentication login Global Configuration mode command defines login authentication To return to the default configuration use the no form of this command Syntax aaa authentication login default ist name method method2 no aaa authentication login default ist name e default Uses the listed authentication methods that follow this argument as the default list of methods when a user logs in e flist name Character string used to name the list of authentication methods activated when a user logs in Range 1 12 characters 4 255 4 Command Line Interface e method method2 Specify at least one from the following table Keyword Description enable Uses the enable password for authentication line Uses the line passwo
570. t configuration is 10 seconds Command Mode Interface Configuration VLAN mode Command Usage The leave timeout should be set greater than the maximum time that a host is allowed to respond to an IGMP query Use immediate leave only where there is just one host connected to a port Example The following example configures the host leave time out to 60 seconds Console config interface vlan 2 Console config if ip igmp snooping leave time out 60 Related Commands ip igmp snooping Global show ip igmp snooping mrouter ip igmp snooping mrouter time out 4 355 4 Command Line Interface show ip igmp snooping interface show ip igmp snooping groups show ip igmp snooping mrouter The show ip igmp snooping mrouter User EXEC mode command displays information on dynamically learned multicast device interfaces Syntax show ip igmp snooping mrouter interface vian ia vilan id VLAN number Default Setting This command has no default configuration Command Mode User EXEC mode Command Usage There are no user guidelines for this command Example The following example displays multicast device interfaces in VLAN 1000 Console gt show ip igmp snooping mrouter interface 1000 VLAN Ports 1000 1 el Detected multicast routers that are forbidden statically VLAN Ports 1000 1 e19 Related Commands ip igmp snooping Global ip igmp snooping Interface ip igmp snooping mrouter time out
571. t from the previous VLAN and adds it to the new VLAN Example The following example configures Ethernet port 1 e16 in access mode to be member of VLAN 23 console config interface ethernet 1 e16 console config if switchport access vlan 23 Related Commands switchport mode switchport trunk allowed vlan switchport trunk native vlan switchport general allowed vlan switchport general pvid switchport general ingress filtering disable switchport general acceptable frame type tagged only switchport forbidden vian show interfaces switchport switchport access multicast tv vlan switchport trunk allowed vian The switchport trunk allowed vian Interface Configuration mode command adds or removes VLANs to or from a trunk port Syntax switchport trunk allowed vlan add vian list remove vian list e add vian list List of VLAN IDs to be added Separate nonconsecutive VLAN IDs with a comma and no spaces A hyphen designates a range of IDs remove vian list List of VLAN IDs to be removed Separate nonconsecutive VLAN IDs with a comma and no spaces A hyphen designates a range of IDs 4 571 4 Command Line Interface Default Setting This command has no default configuration Command Mode Interface Configuration Ethernet port channel mode Command Usage There are no user guidelines for this command Example The following example adds VLANs 1 2 5 to 6 to the allowed list of Ethernet port 1 e1
572. t to point link To establish communications over a point to point link the originating PPP first sends Link Control Protocol LCP packets to configure and test the data link After a link is established and optional facilities are negotiated as needed by the LCP the originating PPP sends Network Control Protocol NCP packets to select and configure one or more network layer protocols When each of the chosen network layer protocols has been configured packets from each network layer protocol can be sent over the link The link remains configured for communications until explicit LCP or NCP packets close the link or until some external event occurs This is the actual switch port link type It may differ from the administrative state Disable Disables point to point link Point to Point Operational Status Displays the point to point operating state Activate Protocol Migration Indicates whether sending Link Control Protocol LCP packets to configure and test the data link is enabled The possible field values are Checked Protocol Migration is enabled e Unchecked Protocol Migration is disabled 3 151 B Configuring the Switch Web Click Spanning Tree STP Rapid Spanning Tree Define the fields and Click Apply Pointte Point Polutte Point Activate mosty Operational Stan Admin Statue Operational Status Protocol Migration terface State Rote Mode Fast Link Vet STP Enable Awe Enatle oC Global S
573. t1x max req dot1x timeout supp timeout dot1x timeout server timeout show dot1x show dot1x users dot1x re authenticate The dot1x re authenticate Privileged EXEC mode command manually initiates a re authentication of all 802 1X enabled ports or the specified 802 1X enabled port Syntax dot1x re authenticate ethernet interface e interface Valid Ethernet port Full syntax unit port Default Setting This command has no default configuration Command Mode Privileged EXEC mode 4 237 4 Command Line Interface Command Usage There are no user guidelines for this command Example The following command manually initiates a re authentication of 802 1X enabled Ethernet port 1 e16 Console dotlx re authenticate ethernet 1 e16 Related Commands dot1x system auth control show dot1x dot1x timeout quiet period The dot1x timeout quiet period Interface Configuration mode command sets the number of seconds that the device remains in the quiet state following a failed authentication exchange for example the client provided an invalid password To return to the default configuration use the no form of this command Syntax dot1x timeout quiet period seconds no dot1x timeout quiet period e seconds Specifies the time in seconds that the device remains in the quiet state following a failed authentication exchange with the client Range 0 65535 seconds Default Setting Quiet period is 60 seconds C
574. tan A e a ae 7 Figure 3 29 SNMP Group Membership Page CLI The following is an example of the SNMP User CLI commands Console config snmp server user John user group 4 455 Defining SNMP Communities Access rights are managed by defining communities in the SNMP Communities Page You may configure up to five community strings authorized for management access using SNMP v1 and v2c For security reasons you should consider removing the default strings When the community names are changed access rights are also changed SNMP communities are defined only for SNMP v1 and SNMP v2c Command Attributes Management Station Displays the management station IP address for which the basic SNMP community is defined e Community String Defines the password used to authenticate the management station to the device e Access Mode Defines the access rights of the community The possible field values are e Read Only Management access is restricted to read only and changes cannot be made to the community e Read Write Management access is read write and changes can be made to the device configuration but not to the community 3 83 B Configuring the Switch SNMP Admin User has access to all device configuration options as well as permissions to modify the community e View Name Contains a list of user defined SNMP views e Remove Removes a community The possible field values are
575. tate Indicates if the port is enabled to provide power Can be Auto or Never Priority The priority of the port from the point of view of inline power management Can be Critical High or Low Status Describes the inline power operational status of the port Can be On Off Test Fail Testing Searching or Fault Classification The power consumption range of the powered device Can be 0 44 12 95 0 44 3 84 3 84 6 49 or 6 49 12 95 Overload Counter Counts the number of overload conditions that has been detected Short Counter Counts the number of short conditions that has been detected Denied Counter Counts the number of times power has been denied Absent Counter Counts the number of times power has been removed because powered device dropout was detected Invalid Signature Counts the number of times an invalid signature of a powered device was Counter detected Related Commands power inline power inline powered device power inline priority power inline usage threshold power inline traps enable 4 404 QoS Commands 4 QoS Commands Table 4 23 QoS Commands Command Function Mode Page qos Enables quality of service QoS on the device To disable QoS on GC 4 406 the device use the no form of this command show qos Displays the quality of service QoS mode for the device UE 4 407 class map Creates or modifies a class map and enter
576. tax show qos Default Setting This command has no default configuration Command Mode User EXEC mode Command Usage Trust mode is displayed if QoS is enabled in basic mode Example The following example displays QoS attributes when QoS is enabled in basic mode on the device Console gt show qos Qos basic Basic trust dscp Related Commands qos class map The create map Global Configuration mode command creates or modifies a class map and enters the Class map Configuration mode To delete a class map use the no form of this command Syntax class map class map name match all match any no class map class map name class map name Specifies the name of the class map match all Checks that the packet matches all classification criteria in the class map match statement Logical AND for selected ACLs match any Checks that the packet matches one or more classification 4 407 4 Command Line Interface criteria in the class map match statement Logical OR for selected ACLs Default Setting By default the match all parameter is selected Command Mode Global Configuration mode Command Usage The class map Global Configuration mode command is used to define packet classification marking and aggregate policing as part of a globally named service policy applied on a per interface basis The Class Map Configuration mode enables entering up to two match Class map Configuration mode commands to c
577. ted to file copy operations console config file system logging copy Related Commands show logging management logging The management logging global configuration command enables logging management access list ACL events To disable logging management access list events use the no form of this command Syntax management logging deny 4 528 Syslog Commands 4 no management logging deny deny Indicates logging messages related to deny actions of management ACLs Default Setting Logging management ACL events is enabled Command Mode Global Configuration mode Command Usage Other types of management ACL events are not subject to this command Example The following example enables logging messages related to deny actions of management ACLs console config management logging deny Related Commands show logging show logging The show logging Privileged EXEC mode command displays the state of logging and the syslog messages stored in the internal buffer Syntax show logging Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command 4 529 4 Command Line Interface Example The following example displays the state of logging and the syslog messages stored in the internal buffer console show logging Logging is enabled Console logging level debugging Console Messages 0
578. terface are tagged The packets contain VLAN information Include Green Includes the port in the VLAN Exclude Gray Excludes the interface from the VLAN However the interface can be added to the VLAN through GARP Forbidden Red Denies the interface VLAN membership even if GARP indicates the port is to be added Web Click VLAN 802 1Q Current Table Define the VLAN ID VLAN Name and VLAN type fields and define the port settings and click Apply WebView Current Table wao J VIAN Mame VAG VUAN Type Stan Pon Et E E E4 E5 6S E7 E9 9 EWO E11 E12 E13 Ete EIS E16 E17 E0 Evo ED E ER ED EM LAG e o u is ise u w Uetagged Tagged Inciude E t cimie BEE Fortron Figure 3 70 VLAN Current Table Page 3 161 B Configuring the Switch CLI The following is an example of the CLI commands used to create VLANs Console config vlan database 4 566 Console config vlan vlan 1972 4 567 Console config if exit 4 560 Console config interface vlan 19 4 567 Console config if name Marketing 4 569 Console config if exit 4 560 Console config interface ethernet 1 e16 4 323 Console config if switchport general allowed vlan add 2 5 6 tagged 4 573 Console config if switchport general pvid 234 4 574 Console config if switchport forbidden vlan add 234 256 4 577 console config if switchport trunk allowed vlan add 1 2 5 6 4 571 Console config if switchport access vl
579. the Ethernet type of the packet Range 0 65535 Default Setting No MAC ACL is defined Command Mode MAC Access List Configuration mode Command Usage Before an Access Control Element ACE is added to an ACL all packets are permitted After an ACE is added an implied deny any any condition exists at the end of the list and those packets that do not match the conditions defined in the permit statement are denied If the VLAN ID is specified the policy map cannot be connected to the VLAN interface Example The following example shows how to create a MAC ACL with permit rules Console config mac access list macl acll Console config mac al permit 6 6 6 6 6 6 0 0 0 0 0 0 any vlan 6 Related Commands mac access list deny MAC 4 272 ACL Commands 4 show access lists deny MAC The deny MAC Access List Configuration mode command denies traffic if the conditions defined in the deny statement match deny destination deny disable port any source source wildcara any destination destination wildcard vlan vian id cos cos cos wildcara ethtype eth type e disable port Indicates that the port is disabled if the statement is deny source Specifies the MAC address of the host from which the packet was sent source wildcard Optional for the first type Specifies wildcard bits by placing 1s in bit positions to be ignored destination Specifies the MAC address of the ho
580. the command continues on the other interfaces Example The following example groups VLANs 221 to 228 and 889 to receive the same command console config interface range vlan 221 228 889 console config if 4 568 VLAN Commands 4 Related Commands interface vian name show vlan name The name Interface Configuration mode command adds a name to a VLAN To remove the VLAN name use the no form of this command Syntax name string no name e string Unique name to be associated with this VLAN Range 1 32 characters Default Setting No name is defined Command Mode Interface Configuration VLAN mode Cannot be configured for a range of interfaces range context Command Usage There are no user guidelines for this command Example The following example gives VLAN number 19 the name Marketing console config interface vlan 19 console config if name Marketing Related Commands vian database vlan show vlan switchport mode The switchport mode Interface Configuration mode command configures the VLAN membership mode of a port To return to the default configuration use the no form of this command Syntax switchport mode access trunk general no switchport mode access Indicates an untagged layer 2 VLAN port 4 569 4 Command Line Interface trunk Indicates a trunking layer 2 VLAN port general Indicates a full 802 1q supported VLAN port Defa
581. the device PE 4 321 at startup copy The copy Privileged EXEC mode command copies files from a source to a destination Syntax copy source url destination url e source url The source file location URL or reserved keyword of the source file to be copied Range 1 160 characters e destination url The destination file URL or reserved keyword of the destination file Range 1 160 characters The following table displays keywords and URL prefixes Keyword Source or Destination flash Source or destination URL for flash memory It s the default in case a URL is specified without a prefix running config Represents the current running configuration file startup config Represents the startup configuration file 4 315 4 Command Line Interface image If the source file represents the active image file If the destination file represents the non active image file boot Boot file tftp Source ordestination URL fora TFTP network server The syntax for this alias is tftp host directory filename The host can be represented by its IP address or hostname xmodem Source for the file from a serial connection that uses the Xmodem protocol unit member image Image file on one of the units To copy from the master to all units specify in the member field unit member boot Boot file on one of the units To copy from the master to all units specify in the
582. the device s power and ventilation sources 3 208 Defining Default Domains 3 Command Attributes Unit No Indicates the unit number for which the device information is displayed Power Supply Status The power supply status The device has two power supplies Power supply 1 is displayed as PS1 in the interface while the redundant power supply is displayed as RPS The possible field values are e Checked The power supply is operating normally Unchecked The power supply is not operating normally Not Present The power supply is currently not present Fan Status The fan status The non PoE devices have two fans while the PoE device have five fans Each fan is denoted as fan plus the fan number in the interface The possible field values are Checked The fan is operating normally Unchecked The fan is not operating normally Not Present A fan is currently not present Temperature The temperature at which the device is currently running The device temperature is displayed in Celsius The device temperature threshold is 0 40 C 32 104F The following table displays the temperature in Fahrenheit in increments of 5 Table 2 Celsius to Farenheit Conversion Table Celsius Farenheit 0 32 5 4 10 50 15 59 20 68 25 77 30 86 35 95 40 104 Web Click Physical Diagnostics Health 3 209 B Configuring the Switch D eit Mo Power Supply Status F
583. the native VLAN when the interface is in trunk mode To IC 4 572 native vlan return to the default configuration use the no form of this command switchport general Adds or removes VLANs from a general port IC 4 573 allowed vlan switchport general Configures the PVID when the interface is in general mode To IC 4 574 pvid return to the default configuration use the no form of this command switchport general Disables port ingress filtering To return to the default IC 4 575 ingress filtering configuration use the no form of this command disable switchport general Discards untagged frames at ingress To return to the default IC 4 576 acceptable frame ty configuration use the no form of this command pe tagged only switchportforbidden Forbids adding specific VLANs to a port To return to the default IC 4 577 vlan configuration use the remove parameter for this command switchport Overrides the FDB decision and sends all Unicast Multicast and IC 4 578 protected Broadcast traffic to an uplink port To return to the default configuration use the no form of the command ip Reserves a VLAN as the internal usage VLAN of an interface To IC 4 579 internal usage vlan_ return to the default configuration use the no form of this command show vlan Displays VLAN information PE 4 580 show vlan internal Displays a list of VLANs used internally by the device PE 4 581 usage show interfaces Displays the switchport configuration
584. the port from learning new addresses To return to the default configuration use the no form of this command Syntax port security forward discard discard shutdown trap seconds no port security e forward Forwards packets with unlearned source addresses but does not learn the address e discard Discards packets with unlearned source addresses This is the default if no option is indicated discard shutdown Discards packets with unlearned source addresses The port is also shut down seconds Sends SNMP traps and defines the minimum amount of time in seconds between consecutive traps Range 1 1000000 4 284 Address Table Commands 4 Default Setting This setting is disabled Command Mode Interface Configuration Ethernet port channel mode Command Usage There are no user guidelines for this command Example The following example port 1 e1 forwards all packets without learning addresses of packets from unknown sources and sends traps every 100 seconds if a packet with an unknown source address is received Console config interface ethernet 1 el Console config if port security forward trap 100 Related Commands port security mode port security max show ports security port security mode The port security mode Interface Configuration mode command configures the port security mode To return to the default configuration use the no form of this command Syntax port securi
585. the same LACP System Priority Notes 1 If the port channel admin key lacp admin key page 4 154 is not set through the CLI when a channel group is formed i e it has a null value of 0 this key is set to the same value as the port admin key used by the interfaces that joined the group lacp admin key 2 To avoid creating a loop in the network be sure you enable LACP before connecting the ports and also disconnect the ports before disabling LACP 3 If the target switch has also enabled LACP on the connected ports the trunk 3 130 Creating Trunks 3 will be activated automatically 4 A trunk formed with another switch using LACP will automatically be assigned the next available trunk ID 5 All ports on both ends of an LACP trunk must be configured for full duplex either by forced mode or auto negotiation The Interface LACP Configuration Page contains parameters for defining the LACP ports Command Attributes e LACP System Priority Determines the link aggregation group LAG membership and to identify this device to other switches during LAG negotiations Ports must be configured with the same system priority to join the same LAG System priority is combined with the switch s MAC address to form the LAG identifier This identifier is used to indicate a specific LAG during LACP negotiations with other systems The field range is 1 65535 and the default is 1 e Unit No Displays the stacking member for w
586. the time for the retransmission of an Extensible ICE 4 241 supp timeout Authentication Protocol EAP request frame to the client To return to the default configuration use the no form of this command dotlx timeout Sets the time that the device waits for a response from the ICE 4 242 server timeout authentication server To return to the default configuration use the no form of this command show dotlx Displays the 802 1X status of the device or specified interface PE 4 243 show dotlx users Displays active 802 1X authenticated users for the device PE 4 246 show dotlx Displays 802 1X statistics for the specified interface PE 4 248 Statistics dotlx auth not req Enables unauthorized devices access to the VLAN To disabled ICV 4 249 4 232 802 1x Commands 4 Table 4 5 802 1x Commands Command Function Mode Page dotlx Enables multiple hosts clients on an 802 1X authorized port ICE 4 250 multiple hosts where the authorization state of the port is set to auto To return to the default configuration use the no form of this command dotlx Configures the action to be taken when a station whose MAC ICE 4 251 single host violation address is not the supplicant MAC address attempts to access the interface Use the no form of this command to return to default dotlx guest vlan Defines a guest VLAN To return to the default configuration use ICV 4 252 the no form of this command dotlx guest vlan Enable
587. thernet interface number port channel port channel number instance instance id show spanning tree detail active blockedports instance instance id show spanning tree mst configuration interface number A valid Ethernet port port channel number A valid port channel number detail Indicates detailed information active Indicates active ports only blockedports Indicates blocked ports only mst configuration Indicates the MST configuration identifier instance id Specifies ID of the spanning tree instance Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command 4 495 4 Command Line Interface The following example displays spanning tree information 32768 00 01 42 97 e0 00 20000 Max Age 20 Forward Delay 15 sec sec 36864 00 02 4b 29 7a 00 Max Age 20 Forward Delay 15 sec sec Cost Sts Role PortFast Type 20000 FWD Root No P2p RSTP 20000 FWD Desg No Shared STP 20000 lt 20000 BLK ALTN No Shared STP Example console show spanning tree Spanning tree enabled mode RSTP Default port cost method long Root Priority ID Address Path Cost Root Port Hello Time 2 sec Brid Priority ge ID Address Hello Time 2 sec Interfaces Name State Prio Nbr 1 el Enabled 128 1 1 e2 Enabled 128 2 1 e3 Disabled 128 3 1 e4 Enabled 128 4 1 e5 Enabled 128 5
588. tics Notes 1 To ensure proper screen refresh be sure that Internet Explorer 5 x is configured as follows Under the menu Tools Internet Options General Temporary Internet Files Settings the setting for item Check for newer versions of stored pages should be Every visit to the page 2 When using Internet Explorer 5 0 you may have to manually refresh the screen after making configuration changes by pressing the browser s refresh button Panel Display The web agent displays an image of the switch s ports The Mode can be set to display different information for the ports including Active i e up or down Duplex i e half or full duplex or Flow Control i e with or without flow control Clicking on the image of a port opens the Interface Configuration Page as described on page 3 128 Figure 3 4 Ports Panel Main Menu Using the onboard web agent you can define system parameters manage and control the switch and all its ports or monitor network conditions The following table briefly describes the selections available from this program Table 3 2 EWS Menu Options System System Management Provides system information including the general device 3 34 information stacking information system logs system time parameters and parameters for managing system files Interfaces Provides information for configuring the device interfaces 3 126 3 33
589. tp port 100 4 596 Defining Profile Rules Access profiles can contain up to 256 rules that determine which users can manage the switch module and by which methods Users can also be blocked from accessing the device Rules are composed of filters including e Rule Priority Interface Management Method IP Address e Prefix Length Forwarding Action The rule order in the profile rules table is important since packets are matched to the first rule meeting the rule criteria The Profiles Rules Page contains parameters for defining profile rules Command Attributes e Access Profile Name Displays the access profile to which the rule is attached 3 96 Defining Access Profiles 3 e Priority Defines the rule priority When the packet is matched to a rule user groups are either granted permission or denied device management access The rule number is essential to matching packets to rules as packets are matched on a first fit basis e Interface Indicates the interface type to which the rule applies The possible field values are e Port Attaches the rule to the selected port LAG Attaches the rule to the selected LAG VLAN Attaches the rule to the selected VLAN Management Method Defines the management method for which the rule is defined Users with this access profile can access the device using the management method selected The possible field values are All Assigns all m
590. tting The device derives the port link type from the duplex mode A full duplex port is considered a point to point link and a half duplex port is considered a shared link Command Modes Interface Configuration Ethernet port channel mode Command Usage There are no user guidelines for this command Example The following example enables shared spanning tree on Ethernet port 1 e5 console config interface ethernet 1 e15 console config if spanning tree link type shared Related Commands spanning tree forward time spanning tree hello time spanning tree max age spanning tree priority spanning tree disable spanning tree cost spanning tree port priority spanning tree portfast show spanning tree spanning tree pathcost method The spanning tree pathcost method Global Configuration mode command sets the default path cost method To return to the default configuration use the no form of this command Syntax spanning tree pathcost method long short no spanning tree pathcost method e long Specifies port path costs with a range of 1 200 000 000 e short Specifies port path costs with a range of 0 65 535 Default Setting Short path cost method 4 481 4 Command Line Interface Command Mode Global Configuration mode Command Usage This command applies to all spanning tree instances on the device The cost is set using the spanning tree cost command Example The following example sets the
591. ty mode lock dynamic no port security mode lock Saves the current dynamic MAC addresses associated with the port and disables learning relearning and aging e dynamic Deletes the current dynamic MAC addresses associated with the port and learns up to the maximum number addresses allowed on the port Relearning and aging are enabled Default Setting This setting is disabled Command Mode Interface Configuration Ethernet port channel mode Command Usage There are no user guidelines for this command 4 285 4 Command Line Interface Example The following example the port security mode is set to dynamic for Ethernet interface 1 e7 Console config interface ethernet 1 e7 Console config if port security mode dynamic Related Commands port security max show ports security port security max The port security max Interface Configuration Ethernet port channel mode command configures the maximum number of addresses that can be learned on the port while the port is in port security mode To return to the default configuration use the no form of this command Syntax port security max max adadr no port security max max addr Maximum number of addresses that can be learned by the port Range 1 128 Default Setting The default is 1 address Command Mode Interface Configuration Ethernet port channel mode Command Usage This command is only relevant in dynamic learning modes Exampl
592. ty model e v3 Indicates the SNMP Version 3 security model e noauth Indicates no authentication of a packet Applicable only to the SNMP Version 3 security model auth lIndicates authentication of a packet without encrypting it Applicable only to the SNMP Version 3 security model e priv lIndicates authentication of a packet with encryption Applicable only to the SNMP Version 3 security model readview Specifies a string that is the name of the view that enables only viewing the contents of the agent If unspecified all objects except for the community table and SNMPv3 user and access tables are available writeview Specifies a string that is the name of the view that enables 4 454 SNMP Commands 4 entering data and configuring the contents of the agent If unspecified nothing is defined for the write view e notifyview Specifies a string that is the name of the view that enables specifying an inform or a trap If unspecified nothing is defined for the notify view Applicable only to the SNMP Version 3 security model Default Setting No group entry exists Command Mode Global Configuration mode Command Usage There are no user guidelines for this command Example The following example attaches a group called user group to SNMPv3 and assigns to the group the privacy security level and read access rights to a view called user view console config snmp server group user group v3 priv read user vi
593. ues For example a packet with a DSCP tag value of 3 can be assigned to queue 2 Command Attributes DSCP In Displays the incoming packet s DSCP value Queue Defines the traffic forwarding queue to which the DSCP priority is mapped Eight traffic priority queues are supported Web Click Policy Priority Mapping DSCP Priority define the fields and click Apply fa ta fa ta fa ta ra ea ta ta ta fa 2 ha ta ea ea fa fa ta fa ta fa hal Figure 3 83 DSCP Priority Page CLI The following is an example of the CLI commands used to map DSCP values to queues Console config qos map dscp queuve 33 40 41 to 1 4 425 Defining Basic QoS Settings The Basic Mode General Page page contains information for enabling Trust on the device Trust is set on a per interface basis Packets entering a QoS domain are 3 182 Configuring Quality of Service 3 classified at the edge of the QoS domain When the packets are classified at the edge Trust mode can be configured on ports To enable trust Command Attributes e Trust Mode Selects the trust mode If a packet s CoS tag and DSCP tags are mapped to different queues the Trust mode determines the queue to which the packet is assigned The possible field values are e None Sets the Trust mode to none Packets are not requeued based on their CoS or DSCP tag value e CoS Sets the Trust mode to CoS Packets are requeued based o
594. ues are e Checked Removes the selected default gateway e Unchecked Maintains the default gateway 3 47 B Configuring the Switch Web Click System IP Addressing IP Interface define the fields and and specify a Primary interface click Apply Default Gateway Uses Defined Detault Gateway Active Detault Gateway Remove G Aoo Figure 3 11 Default Gateway Page CLI The following is an example of the CLI commands for defining a default gateway Console config ip default gateway 192 168 1 1 4 361 Configuring DHCP The Dynamic Host Configuration Protocol DHCP assigns dynamic IP addresses to devices on a network DHCP ensures that network devices can have a different IP address every time the device connects to the network DHCP may lease addresses to clients indefinitely or for a specific period of time If the address expires or the switch is moved to another network segment you will lose management access to the switch If DHCP is enabled the IP will not function until a reply has been received from the server Requests will be broadcast periodically by the switch for an IP address If your network provides DHCP services you can configure the switch to be dynamically configured by these services The DHCP Page contains parameters for assigning IP addresses to devices Command Attributes e Interface Displays the DHCP interface address which is connected to the device 3 48 Conf
595. ug 2004 15 41 39 LINEPROTO 5 UPDOWN Line protocol on Interface Ethernet1 3 changed state to down oe 4 530 Syslog Commands 4 Related Commands logging on logging logging console logging buffered logging buffered size clear logging logging file clear logging file aaa logging file system logging management logging show logging file The show logging file Privileged EXEC mode command displays the state of logging and the syslog messages stored in the logging file Syntax show logging file Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays the logging state and the syslog messages stored in the logging file console show logging file Logging is enabled Console logging level debugging Console Messages 0 Dropped severity Buffer logging level debugging Buffer Messages 11 Logged 200 Max File logging level notifications File Messages 0 Dropped severity Syslog server 192 180 2 27 logging errors Messages 6 Dropped severity Syslog server 192 180 2 28 logging errors Messages 6 Dropped severity 2 messages were not logged resources 4 531 4 Command Line Interface Application filtering control Application Event Status AAA Login Enabled File system Copy Enabled File system Delet
596. ult Setting All ports are in access mode and belong to the default VLAN whose VID 1 Command Mode Interface Configuration Ethernet port channel mode Command Usage There are no user guidelines Example The following example configures Ethernet port 1 e16 as an untagged layer 2 VLAN port console config interface ethernet 1 e16 console config if switchport mode access Related Commands switchport access vlan switchport trunk allowed vlan switchport trunk native vian switchport general allowed vian switchport general pvid switchport general ingress filtering disable switchport general acceptable frame type tagged only switchport forbidden vian show interfaces switchport switchport access multicast tv vlan switchport access vlan The switchport access vlan Interface Configuration mode command configures the VLAN ID when the interface is in access mode To return to the default configuration use the no form of this command Syntax switchport access vlan v an id dynamic no switchport access vlan vlan id Specifies the ID of the VLAN to which the port is configured e dynamic Indicates that the port is assigned to a VLAN based on the source MAC address of the host connected to the port 4 570 VLAN Commands 4 Default Setting All ports belong to VLAN 1 Command Mode Interface configuration Ethernet port channel mode Command Usage The command automatically removes the por
597. ultiple Spanning Tree Protocol MSTP IEEE 802 1s 605 VLAN Support Up to 255 groups port based protocol based or tagged 802 1Q GVRP for automatic VLAN learning private VLANs Class of Service Supports eight levels of priority and Weighted Round Robin Queueing which can be configured by VLAN tag or port Layer 3 4 priority mapping IP Precedence IP DSCP Multicast Filtering IGMP Snooping Layer 2 Additional Features BOOTP client SNTP Simple Network Time Protocol SNMP Simple Network Management Protocol RMON Remote Monitoring groups 1 2 3 9 Management Features In Band Management Telnet Web based HTTP or HTTPS SNMP manager or Secure Shell Out of Band Management RS 232 RJ 45 console port Software Loading TFTP in band or XModem out of band SNMP Management access via MIB database Trap management to specified hosts RMON Groups 1 2 3 9 Statistics History Alarm Event Standards 606 IEEE 802 3 Ethernet IEEE 802 3u Fast Ethernet IEEE 802 3x Full duplex flow control ISO IEC 8802 3 IEEE 802 3z Gigabit Ethernet IEEE 802 3ab 1000BASE T IEEE 802 3ac VLAN tagging IEEE 802 1Q VLAN IEEE 802 1v Protocol based VLANs IEEE 802 3ad Link Aggregation Control Protocol IEEE 802 1D Spanning Tree Protocol and traffic priorities IEEE 802 1p Priority tags Management Information Bases IEEE 802 1s Multiple Spanning Tree Protocol IEEE 802 1w Rapid Spanning Tree Protocol IEEE 802 1x Port Authentication AR
598. umber interface A valid Ethernet port Full syntax unit port port channel number A valid port channel number Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example clears all GVRP statistical information on Ethernet port 1 e6 Console clear gvrp statistics ethernet 1 e6 Related Commands show gvrp statistics show gvrp error statistics show gvrp configuration The show gvrp configuration User EXEC mode command displays GVRP configuration information including timer values whether GVRP and dynamic VLAN creation is enabled and which ports are running GVRP 4 348 GVRP Commands 4 Syntax show gvrp configuration ethernet interface port channel port channel number e interface A valid Ethernet port Full syntax unit port e port channel number A valid port channel number Default Setting This command has no default configuration Command Mode User EXEC mode Command Usage There are no user guidelines for this command Example The following example displays GVRP configuration information Console gt show gvrp configuration GVRP Feature is currently enabled on the device Timers milliseconds Port s Status Registration Dynamic Join Leave Leave All VLAN Creation 2 el Enabled Normal Enabled 200 600 10000 4 e4 Enabled Normal Enab
599. umber Range 0 65535 Default Setting The default configuration revision number is 0 Command Mode MST Configuration mode Command Usage There are no user guidelines for this command 4 490 Spanning Tree Commands 4 Example The following example sets the configuration revision to 1 console config Spanning tree mst configuration console config mst revision 1 Related Commands spanning tree mst priority spanning tree mst max hops spanning tree mst port priority spanning tree mst cost spanning tree mst configuration instance mst name mst show mst exit mst abort mst show spanning tree show mst The show MST Configuration mode command displays the current or pending MST region configuration Syntax show current pending e current Indicates the current region configuration pending Iindicates the pending region configuration Default Setting This command has no default configuration Command Mode MST Configuration mode Command Usage The pending MST region configuration takes effect only after exiting the MST configuration mode Example The following example displays a pending MST region configuration console config mst show pending Pending MST configuration 4 491 4 Command Line Interface Name Regionl Revision 1 Instance Vlans Mapped State 0 1 9 21 4094 Enabled 1 10 20 Enabled Related Commands spanning tree mst priority
600. unity string use the no form of this command Syntax snmp server community community ro rw su p address view view name snmp server community group community group name ip address no snmp server community community ip address community Community string that acts like a password and permits access to the SNMP protocol Range 1 20 characters ro Indicates read only access default e rw Indicates read write access e su lIndicates SNMP administrator access jp address Specifies the IP address of the management station group name Specifies the name of a previously defined group A group defines the objects available to the community Range 1 30 characters view name Specifies the name of a previously defined view The view defines the objects available to the community Range 1 30 characters Default Setting No communities are defined Command Mode Global Configuration mode Command Usage The view name parameter cannot be specified for su which has access to the whole MIB The view name parameter can be used to restrict the access rights of a community string When it is specified 4 452 SNMP Commands 4 An internal security name is generated The internal security name for SNMPv1 and SNMPv2 security models is mapped to an internal group name The internal group name for SNMPv1 and SNMPv2 security models is mapped to a view name read view and notify view al
601. uration instance mst name mst revision mst show mst exit mst abort mst show spanning tree spanning tree mst max hops The spanning tree mst priority Global Configuration mode command configures the number of hops in an MST region before the BDPU is discarded and the port information is aged out To return to the default configuration use the no form of this command Syntax spanning tree mst max hops hop count no spanning tree mst max hops hop count Number of hops in an MST region before the BDPU is discarded Range 1 40 Default Setting The default number of hops is 20 Command Mode Global Configuration mode Command Usage There are no user guidelines for this command 4 484 Spanning Tree Commands 4 Example The following example configures the maximum number of hops that a packet travels in an MST region before it is discarded to 10 console config Spanning tree mst max hops 10 Related Commands spanning tree mst priority spanning tree mst port priority spanning tree mst cost spanning tree mst configuration instance mst name mst revision mst show mst exit mst abort mst show spanning tree spanning tree mst port priority The spanning tree mst port priority Interface Configuration mode command configures port priority for the specified MST instance To return to the default configuration use the no form of this command Syntax spanning tree mst i
602. ured no Address 00 02 4b 29 7a 00 Designated path cost 20000 H H H H MST 1 Vlans Mapped 10 20 Root ID Priority 24576 Address 00 02 4b 29 89 76 Path 20000 Cost Port 4 1 Cost e4 Rem hops 19 Bridge ID Priority 32768 Address 00 02 4b 29 7a 00 Number of topology changes 2 last change occurred 1d9h ago Times hold 1 topology change 2 notification 2 hello 2 max age 20 forward delay 15 Port 1 1 el enabled State Forwarding Role Boundary Port id 128 1 Port cost 20000 Type P2p configured auto Boundary RSTP Port Fast No configured no Designated bridge Priority 32768 Address 00 02 4b 29 7a 00 Designated port id 128 1 Designated path cost 20000 Port 2 1 e2 enabled State Forwarding Port id 128 2 Type Shared configured auto Boundary STP Designated bridge Priority 32768 Designated port id 128 2 Number of transitions to forwarding state BPDU sent 2 received 170638 Port 3 1 e3 disabled State Blocking Port id 128 3 Type Shared configured auto Internal Designated bridge Priority 32768 Designated port id 128 78 Number of transitions to forwarding state BPDU sent 2 received 170638 Port 4 1 e4 enabled State Forwarding Port id 128 4 Type Shared configured auto Internal Designated bridge Priority 32768 Designated port id 128 2 Number of transitions to forwarding state BPDU sent 2 received 170638 console show spanning tree Spann
603. uring SNTP 3 Polling For Broadcast Time Information Broadcast information is used when the server IP address is unknown When a broadcast message is sent from an SNTP server the SNTP client listens for the response The SNTP client neither sends time information requests nor receives responses from the Broadcast server Message Digest 5 MD5 Authentication safeguards device synchronization paths to SNTP servers MD5 is an algorithm that produces a 128 bit hash MD5 is a variation of MD4 and increases MD4 security MD5 verifies the integrity of the communication authenticates the origin of the communication Defining SNTP Global Settings The SNTP Configuration Global Settings Page provides information for defining SNTP parameters globally Command Attributes e Poll Interval Defines the interval in seconds at which the SNTP server is polled for Unicast information The Poll Interval default is 1024 seconds Enable Receive Broadcast Servers Updates Defines whether or not the device monitors the SNTP servers for the interface s Broadcast server time information The possible values are Enable Enables the device to receive Broadcast server updates Disable Disables the device from receiving Broadcast server updates Enable Receive Anycast Servers Updates Defines whether or not the device polls the SNTP server for Anycast server time information If both the Enable Receive Anycast Servers Update and t
604. ursor to the beginning of the command line Ctrl E Moves the cursor to the end of the command line Ctrl Z End Returns back to the Privileged EXEC mode from any configuration mode 4 229 4 Command Line Interface Command Groups The system commands can be broken down into the functional groups shown below Table 4 4 Command Groups server create or update SNMP server entries and specify SNMP enginelD Command Group Description Page 802 1x Commands Specify authentication authorization and accounting AAA methods 4 231 for use on interfaces running IEEE 802 1X Enable 802 1x globally AAA Commands Define authentication method lists for servers 4 255 ACL Commands Display access control lists ACLs defined on the device 4 265 Address Table Commands Register MAC layer multicast addresses and handle MAC layer 4 276 secure address to a routed port AMAP Configuration Enable or disable AMAP on the switch 4 295 Clock Commands Show the configuration or status of the Simple Network Time Protocol 4 298 SNTP Configuration and Image Display the contents of the currently running configuration file specify 4 315 File Commands contents of image files Ethernet Configuration Configure multiple Ethernet type interfaces 4 322 Commands GVRP Commands Display GVRP configuration information enable GVRP globally oron 4 343 an Interface IGMP Sn
605. ut LONG 4 374 LACP Activity Aggregation synchronization collecting distributing expired Port 1 el LACP Statistics LACP PDUs sent LACP PDUs received Port 1 el LACP Protocol State LACP State Machines Receive FSM Mux FSM Periodic Tx FSM Control Variables BEGIN LACP Enabled Ready N Selected Port_moved NNT Port_enabled Timer counters periodic tx timer wait while timer current while timer LACP Commands 4 PASSIVE AGGREGATABLE FALSE FALSE FALSE FALSE Port Disabled State Detached State No Periodic State FALSE TRUE FALSE UNSELECTED FALSE FALSE FALSE Related Commands lacp port priority lacp timeout show lacp port channel show lacp port channel The show lacp port channel Privileged EXEC mode command displays LACP information for a port channel 4 Command Line Interface Syntax show lacp port channel port_channel_number port_channel_number Valid port channel number Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays LACP information about port channel 1 Console show lacp port channel 1 Port Channel 1 Port Type 1000 Ethernet Actor System Priority 1 MAC Address 00 02 85 0E 1C 00 Admin Key 29 Oper Key 29 Partner System Priority 0 M
606. utlying CIST root e Role Indicates the port role assigned by the STP algorithm to provide to STP paths The possible field values are e Root Provides the lowest cost path to forward packets to the root device Designated Indicates the port or LAG through which the designated device is attached to the LAN e Alternate Provides an alternate path to the root device from the root interface e Backup Provides a backup path to the designated port path toward the Spanning Tree leaves Backup ports occur only when two ports are connected in a loop by a point to point link or when a LAN has two or more connections connected to a shared segment 3 155 B Configuring the Switch Disabled Indicates the port is not participating in the Spanning Tree Mode Indicates the STP mode by which STP is enabled on the device The possible field values are e Classic STP Classic STP is enabled on the device This is the default value Rapid STP Rapid STP is enabled on the device e Multiple STP Multiple STP is enabled on the device e Interface Priority Defines the interface priority for the specified instance The default value is 128 e Path Cost Indicates the port contribution to the Spanning Tree instance The range should always be 1 200 000 000 e Designated Bridge ID Displays the ID of the bridge that connects the link or shared LAN to the root e Designated Port ID Displays the ID of the po
607. ve A I9 Figure 3 72 MAC Based VLAN Groups Page 3 164 Configuring VLANs 3 CLI The following is an example of the CLI commands used to create MAC Based VLAN groups map mac macs group 4 592 show vlan macs groups Configuring Subnet Based VLAN Groups The Subnet Based VLAN Groups Page contains information for defining Subnet Based VLAN groups Command Attributes Group ID Defines the IP based VLAN ID The possible field range is 1 2147483647 IP Address Defines the IP address assigned to the VLAN group e Prefix Defines the IP address s prefix The possible field range is 0 32 Web Click VLAN VLAN Groups MAC based VLAN Groups Define the fields and click Apply Subnet Based VLAN Groups Growp I IP Addiess Prefix Medity Remave 4 Cc Figure 3 73 Subnet Based VLAN Groups Page CLI The following is an example of the CLI commands used to create IP Based VLAN groups map mac macs group 4 592 show vlan macs group 4 593 3 165 B Configuring the Switch Configuring Protocol Based VLAN Groups The Protocol Based VLAN Groups Page contains information regarding protocol names and the VLAN Ethernet type Interfaces can be classified as a specific protocol based interface The classification places the interface into a protocol group Command Attributes Group ID Defines the IP based VLAN ID The possible field range is 1 2147483647 IP Address
608. w dotlx advanced 91 92 Multiple Hosts Guest VLAN Disabled Enabled Enabled Disabled advanced ethernet 1 e1 Multiple Hosts Guest VLAN Disabled Enabled Single host parameters Violation action Discard Single host locked trap 9 Related Commands dot1x auth not req dot1x multiple hosts dot1x single host violation dot1x guest vlan dot1x guest vlan enable 4 254 AAA Commands 4 AAA Commands Table 4 6 AAA Commands Command Function Mode Page aaa authentication Defines login authentication To return to the default configuration GC 4 255 login use the no form of this command aaa authentication Defines authentication method lists for accessing higher privilege GC 4 257 enable levels To return to the default configuration use the no form of this command login authentication Specifies the login authentication method list for a remote telnet or LC 4 258 console To return to the default configuration specified by the aaa authentication login command use the no form of this command enable Specifies the authentication method list when accessing a higher LC 4 259 authentication privilege level from a remote telnet or console To return to the default configuration specified by the aaa authentication enable command use the no form of this command ip http Specifies authentication methods for HTTP server users To GC 4 259 authentication return to the defaul
609. w running config Privileged EXEC mode command displays the contents of the currently running configuration file Syntax show running config Default Setting This command has no default configuration 4 319 4 Command Line Interface Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command Example The following example displays the contents of the running configuration file Console show running config software version 1 1 hostname device interface ethernet 1 el ip address 176 242 100 100 255 255 255 0 duplex full speed 100 interface ethernet 1 e2 ip address 176 243 100 100 255 255 255 0 duplex full speed 100 Related Commands copy delete show startup config show startup config The show startup config Privileged EXEC mode command displays the contents of the startup configuration file Syntax show startup config Default Setting This command has no default configuration Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command 4 320 Configuration and Image File Commands 4 Example The following example displays the contents of the running configuration file Console show startup config software version 1 hostname device interface ethernet 1 el1 ip address 176 242 100 100 255 255 255 0 duplex full speed 100 interface ethernet 1 e2 ip address 176 243 100 100 255 255 255 0 duplex full sp
610. was not received for a host time out period from a specific port this port is deleted from the member list of that multicast group To return to the default configuration use the no form of this command Syntax ip igmp snooping host time out time out no ip igmp snooping host time out e time out Host timeout in seconds Range 1 2147483647 Default Setting The default host time out is 260 seconds Command Mode Interface Configuration VLAN mode 4 353 4 Command Line Interface Command Usage The timeout should be at least greater than 2 query_interval max_response_time of the IGMP router Example The following example configures the host timeout to 300 seconds Console config interface vlan 2 Console config if ip igmp snooping host time out 300 Related Commands ip igmp snooping Global ip igmp snooping mrouter time out ip igmp snooping leave time out show ip igmp snooping mrouter show ip igmp snooping interface show ip igmp snooping groups ip igmp snooping mrouter time out The ip igmp snooping mrouter time out Interface Configuration VLAN mode command configures the mrouter time out The ip igmp snooping mrouter time out Interface Configuration VLAN mode command is used for setting the aging out time after multicast device ports are automatically learned To return to the default configuration use the no form of this command Syntax ip igmp snooping mrouter time out time out no ip igmp sn
611. ways and for rw for write view also The group name parameter can also be used to restrict the access rights of a community string When it is specified An internal security name is generated The internal security name for SNMPv1 and SNMPv2 security models is mapped to the group name Example The following example defines community access string public to permit administrative access to SNMP protocol at an administrative station with IP address 192 168 1 20 console config snmp server community public su 192 168 1 20 Related Commands show snmp snmp server view The snmp server view Global Configuration mode command creates or updates a Simple Network Management Protocol SNMP server view entry To remove a specified SNMP server view entry use the no form of this command Syntax snmp server view view name oid tree included excluded no snmp server view view name oid tree view name Specifies the label for the view record that is being created or updated The name is used to reference the record Range 1 30 characters oid tree Specifies the object identifier of the ASN 1 subtree to be included or excluded from the view To identify the subtree specify a text string consisting of numbers such as 1 3 6 2 4 or a word such as system Replace a single subidentifier with the asterisk wildcard to specify a subtree family for example 1 3 4 included lIndicates that the view type is included
612. wcontrol on 4 329 The following is an example for enabling back pressure on port e1 using CLI commands Console config interface ethernet e1 4 323 Console config if speed 10 4 326 Console config if back pressure 4 330 Booting the Switch To boot the switch perform the following 1 Ensure that the device console is connected to a VT100 terminal device or VT100 terminal emulator 2 Deactivate the AC power receptacle 3 Connect the device to the AC receptacle 4 Activate the AC power receptacle When the power is turned on with the local terminal already connected the switch goes through Power On Self Test POST POST runs every time the device is initialized and checks hardware components to determine if the device is fully operational before completely booting If a critical problem is detected the program flow stops If POST passes successfully a valid executable image is loaded into RAM POST messages are displayed on the terminal and indicate test success or failure 2 14 Booting the Switch 2 As the switch boots the bootup test first counts the device memory availability and then continues to boot The following screen is an example of the displayed POST Performing the Power On Self Test POST UART Channel Loopback Testre erered is ees eaei ea PASS Testing the System SDRAMs 5 5 20 cacy aioe REA ERER vege PASS Booti Checksum Tests o 5 scp cccsesene Sie ERRE Ss ER
613. ween traps The default value is 10 seconds Web Click Security Traffic Control Port Security define the fields and click Apply TE TE y WebView Port Security letertace Intertace Status Learning Mode Max Ennies Action Trap Lele Mesin Lad 4 s a v a z Lad m m m w m s rd m bid Chad Crad 2 z m 2 z ma l g Figure 3 43 Port Security Page 3 107 B Configuring the Switch CLI The following is an example of the Port Security CLI commands Console config interface ethernet 1 el 4 323 Console config if port security forward trap 100 4 284 Console config if port security mode dynamic 4 285 Console config if port security max 20 4 286 3 108 Port Based Authentication 3 Port Based Authentication Network switches can provide open and easy access to network resources by simply attaching a client PC Although this automatic configuration and access is a desirable feature it also allows unauthorized personnel to easily intrude and possibly gain access to sensitive network data The IEEE 802 1x dotix standard defines a port based access control procedure that prevents unauthorized access to a network by requiring users to first submit credentials for authentication Access to all switch ports in a network can be centrally controlled from a server which means that authorized users can use the same credential
614. with specific MAC addresses These addresses are either manually defined on the port or learned on that port up to the point when it is locked When a packet is received on a locked port and the packet source MAC address is not tied to that port either it was learned on a different port or it is unknown to the system the protection mechanism is invoked and can provide various options Unauthorized packets arriving at a locked port are either e Forwarded e Discarded with no trap 3 105 B Configuring the Switch Discarded with a trap The port is shut down Port security allows you to configure a switch port with one or more device MAC addresses that are authorized to access the network through that port When port security by MAC address is enabled on a port the switch stops learning new MAC addresses on the specified port when it has reached a configured maximum number Only incoming traffic with source addresses already stored in the dynamic or static address table will be accepted as authorized to access the network through that port If a device with an unauthorized MAC address attempts to use the switch port the intrusion will be detected and the switch can automatically take action by disabling the port and sending a trap message To use port security by MAC address specify a maximum number of addresses to allow on the port and then let the switch dynamically learn the source MAC address VLAN pair for frames received on th
615. xample The following example configures the line baud rate to 115200 Console config line console Console config line speed 115200 Related Commands show line autobaud The autobaud Line Configuration mode command sets the line for automatic baud rate detection autobaud To disable automatic baud rate detection use the no form of the command Syntax autobaud 4 378 Line Commands 4 no autobaud Default Setting Autobaud is disabled Command Mode Line Configuration console mode Command Usage This command is available only on the line console To start communication using Autobaud press lt Enter gt twice This configuration applies only to the current session Example The following example enables autobaud Console config line console Console config line autobaud Related Commands show line exec timeout The exec timeout Line Configuration mode command sets the interval that the system waits until user input is detected To return to the default configuration use the no form of this command Syntax exec timeout minutes seconds no exec timeout minutes Specifies the number of minutes Range 0 65535 seconds Specifies additional time intervals in seconds Range 0 59 Default Setting The default configuration is 10 minutes Command Mode Line Configuration mode Command Usage To specify no timeout enter the exec timeout 0 command Example The f
616. ximum table size 500 Time Jan 18 2002 21 57 00 Jan 18 2002 21 57 30 Owner Me Interval 1800 Granted samples 50 Dropped Collisio ns 3 0 3 0 3 217 B Configuring the Switch Defining RMON Events Control The RMON Events Control Page contains fields for defining RMON events Command Attributes Event Entry Displays the event Community Displays the community to which the event belongs Description Displays the user defined event description Type Describes the event type Possible values are Log Indicates that the event is a log entry Trap Indicates that the event is a trap Log and Trap Indicates that the event is both a log entry and a trap None Indicates that no event occurred Time Displays the time that the event occurred Owner Displays the device or user that defined the event Remove Removes a RMON event The possible field values are Checked Removes a selected RMON event Unchecked Maintains RMON events Web Click System RMON Events Events Control and select an interface Events Control bea Community Description Type Time Owner Remove 1 Cc z ase Figure 3 105 RMON Events Control Page CLI The following is an example of the CLI commands used to view RMON events Control statistics 3 218 Managing RMON Statistics 3 Console config rmon event 10 log 4 447 3 219 B Configuri
617. xists If no password is set the process still succeeds This has the same effect as using the command aaa authentication enable default enable none Command Mode Global Configuration mode Command Usage The default and optional list names created with the aaa authentication enable command are used with the enable authentication command The additional methods of authentication are used only if the previous method returns an error not if it fails To ensure that the authentication succeeds even if all methods return an error specify none as the final method in the command line 4 257 4 Command Line Interface All aaa authentication enable default requests sent by the device to a RADIUS or TACACS server include the username enabx where x is the requested privilege level Example The following example sets the enable password for authentication when accessing higher privilege levels Console config aaa authentication enable default enable Related Commands aaa authentication dot1x aaa authentication login login authentication show authentication methods login authentication The login authentication Line Configuration mode command specifies the login authentication method list for a remote telnet or console To return to the default configuration specified by the aaa authentication login command use the no form of this command Syntax login authentication default ist name no login authenticati
618. y sntp authenticate sntp trusted key sntp broadcast client enable sntp anycast client enable sntp unicast client enable sntp unicast client poll sntp broadcast client enable The sntp broadcast client enable Global Configuration mode command enables Simple Network Time Protocol SNTP broadcast clients To disable SNTP broadcast clients use the no form of this command Syntax sntp broadcast client enable no sntp broadcast client enable Default Setting The SNTP broadcast client is disabled 4 306 Clock Commands 4 Command Mode Global Configuration mode Command Usage Use the sntp client enable Interface Interface Configuration mode command to enable the SNTP client on a specific interface Example The following example enables the SNTP broadcast clients Console config sntp broadcast client enable Related Commands sntp authentication key sntp authenticate sntp trusted key sntp client poll timer sntp anycast client enable sntp unicast client enable sntp unicast client poll sntp anycast client enable The sntp anycast client enable Global Configuration mode command enables SNTP anycast client To disable the SNTP anycast client use the no form of this command Syntax sntp anycast client enable no sntp anycast client enable Default Setting The SNTP anycast client is disabled Command Mode Global Configuration mode Command Usage Polling time is determined by the sntp
619. y of October at 2 00 Offset is 60 minutes Related Commands clock set clock source clock timezone clock summer time show sntp configuration The show sntp configuration Privileged EXEC mode command shows the configuration of the Simple Network Time Protocol SNTP Syntax show sntp configuration Default Setting This command has no default configuration Command Mode Privileged EXEC mode 4 312 Clock Commands 4 Command Usage There are no user guidelines for this command Example The following example displays the current SNTP configuration of the device Console show sntp configuration Polling interval 7200 seconds MD5 Authentication keys 8 9 Authentication is required for synchronization Trusted Keys 8 9 Unicast Clients Enabled Unicast Clients Polling Enabled Server Polling Encryption Key 176 1 1 8 Enabled 9 176 1 8 179 Disabled Disabled Broadcast Clients Enabled Anycast Clients Enabled Broadcast and Anycast Interfaces 1 el 1 e3 Related Commands sntp authenticate sntp trusted key sntp client poll timer sntp broadcast client enable sntp anycast client enable sntp unicast client enable sntp unicast client poll 4 313 4 Command Line Interface show sntp status The show status Privileged EXEC mode command shows the status of the Simple Network Time Protocol SNTP Syntax show sntp status Default Setting This command has no default co
620. yslogs use the no form of this command Syntax logging ip address hostname port porf severity evel facility facility description texi no logging ip address hostname ip address IP address of the host to be used as a syslog server hostname Specifies the host name of the syslog server Range 1 158 characters port Specifies the port number for syslog messages Range 1 65535 e level Specifies the severity level of logged messages sent to the syslog servers Possible values emergencies alerts critical errors warnings notifications informational and debugging 4 522 Syslog Commands 4 e facility Specifies the facility that is indicated in the message Possible values local0 local1 local2 local3 local4 local5 local 6 local7 e text Syslog server description Range 1 64 characters Default Setting The default port number is 514 The default logging message level is informational The default facility is local7 Command Mode Global Configuration mode Command Usage Up to 8 syslog servers can be used If no specific severity level is specified the global values apply to each server Example The following example limits logged messages sent to the syslog server with IP address 10 1 1 1 to severity level critical console config logging 10 1 1 1 severity critical Related Commands show logging logging console The logging console Global Co
621. ystem LAGS LAG STP Enatte Ato Enabee n TA w Figure 3 65 Rapid Spanning Tree Page CLI The following is an example of the RSTP commands console show spanning tree 4 479 Defining Multiple Spanning Tree Multiple Spanning Tree MSTP provides differing load balancing scenarios For example while port A is blocked in one STP instance the same port can be placed in the Forwarding state in another STP instance The MSTP General Page contains information for defining global MSTP settings including region names MSTP revisions and maximum hops MSTP generates a unique spanning tree for each instance This provides multiple pathways across the network thereby balancing the traffic load preventing wide scale disruption when a bridge node in a single instance fails and allowing for faster convergence of a new topology for the failed instance By default all VLANs are assigned to the Internal Spanning Tree MST Instance 0 that connects all bridges and LANs within the MST region This switch supports up to 16 instances You should try to group VLANs which cover the same general area of your network However remember that you must configure all bridges within the same MSTI Region with the same set of instances and the same instance on each bridge with the same set of VLANs Also note that RSTP treats each MSTI region as a single node connecting all regions to the Common Spanning Tree 3 152 Defining Spanning Tree 3 C

Download Pdf Manuals

image

Related Search

Related Contents

SOMMAIRE Equipement Instructions générales. 1.Vue générale 1.1  Ideal Christmas Ham Deals  Mode d`emploi  P89 システム特徴 プロライトのタワーシステムは 4 つのタイプのリギング    

Copyright © All rights reserved.
Failed to retrieve file